2019 4th International Conference on Information Systems and Computer Networks (ISCON)最新文献

筛选
英文 中文
Privacy, Security Of Cookies In HTTP Transmission HTTP传输中cookie的隐私和安全性
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036289
Sai Lahari Velagapudi, Himanshu Gupta
{"title":"Privacy, Security Of Cookies In HTTP Transmission","authors":"Sai Lahari Velagapudi, Himanshu Gupta","doi":"10.1109/ISCON47742.2019.9036289","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036289","url":null,"abstract":"Web application and web browsers generally use cookies to capture the data which is being transmitted in the sequent communication that provides continuity and state across HTTP connections. A cookie is a file which contains an end user's information and which sent by website (web server). Cookies allow us to get round the statelessness of the hypertext transfer protocol by storing information at the client-side. Due to highly sensitive nature of information involved in e-commerce, extra steps must be taken to make sure that information is secure. A preparatory form of communication enables us to avoid exploitation of cookies. Securing the cookies provide possible answer to the present drawback. As cookies are transferred in plain text there are high possibilities of that cookies can be manipulated. This paper proposes a new mechanism which helps to encrypt the cookies and protect them from possible threats.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125168410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
One v/s All SVM Implementation for Keystroke based Authentication System 基于击键认证系统的一v/s全支持向量机实现
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036203
Darpan Kumar Purwar, Deepika Vishwakarma, N. Singh, V. Khemchandani
{"title":"One v/s All SVM Implementation for Keystroke based Authentication System","authors":"Darpan Kumar Purwar, Deepika Vishwakarma, N. Singh, V. Khemchandani","doi":"10.1109/ISCON47742.2019.9036203","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036203","url":null,"abstract":"Authentication systems have laid the foundation for validating and securing user's identity. Due to increasing vulnerabilities, the traditional methods like passwords, PINs, tokens etc. cannot keep up with the challenges. The behavioural biometrics like Keystroke dynamics is used to authenticate a legitimate user through typing patterns. In this paper, we propose a machine learning approach to develop an authentication system that provides more robust user identity information using keystroke dynamics biometrics. One-v/s-all classification is applied to 51 users of CMU dataset. For optimization, the SVM classifier is used along with Grid Search for parameter tuning. Grid Search satisfies the goal of choosing the best kernel parameter pair. Experimental evaluation in a heterogeneous environment yields a false acceptance rate (FAR) of 0.2% and a false rejection rate (FRR) of 10.24%. The graphical representation of the result is expressed through ROC (Receiver Operating Characteristic) curve which shows the increased reliability of the system for authentication purpose.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130732739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DDoS Mitigation in Eucalyptus Cloud Platform Using Snort and Packet Filtering — IP-Tables 使用Snort和包过滤的Eucalyptus云平台DDoS缓解- ip表
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036183
Beenish Habib, Farida Khurshid, A. Dar, Zubair Shah
{"title":"DDoS Mitigation in Eucalyptus Cloud Platform Using Snort and Packet Filtering — IP-Tables","authors":"Beenish Habib, Farida Khurshid, A. Dar, Zubair Shah","doi":"10.1109/ISCON47742.2019.9036183","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036183","url":null,"abstract":"Cloud Computing is technologically the emerging trend of providing computational resources on demand, may that be storage, network or computation, it encompasses all. The resources can be provided by private, public or a hybrid cloud. Cloud computing is the future of computing and is struggling with the concern of security. Among all security concerns, the Distributed Denial of Service (DDoS) attack is one of the biggest threats to both Internet Security and to Cloud as well. A sizable amount of bots is indulged in the creation of DDoS attacks on a Cloud target by flooding them with malformed packets to exhaust the resources. On the other hand, Economic Denial of Sustainability (EDoS) is a new threat to Cloud security which exploits the cloud elasticity and auto-scaling features and charges the user way too high; thus making economically a theft in it. Public cloud is less prone to attacks as they have inbuilt load balancers and mitigation setups. A private cloud like Eucalyptus is more vulnerable to DDoS attacks as they have lesser defense setups. To overcome these issues we propose a system of DDoS mitigation using Snort for DDoS detection and Packet Filtering IP-Tables in Private cloud set up of Eucalyptus. It acts as our defensive front. This way, our cloud gets saved from DDoS attack without it being burdened with the excess traffic.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131864407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Security Enhancement through IRIS and Biometric Recognition in ATM 利用IRIS和生物识别技术提高ATM机的安全性
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036156
Abhishek Tyagi, Ipsita, Rajbala Simon, S. Khatri
{"title":"Security Enhancement through IRIS and Biometric Recognition in ATM","authors":"Abhishek Tyagi, Ipsita, Rajbala Simon, S. Khatri","doi":"10.1109/ISCON47742.2019.9036156","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036156","url":null,"abstract":"Security system is the main issue in today's life. As security system is growing up, iris recognition and biometric system are emerging as important methods of biometrics based identification systems. These systems have improved the quality of personal authentication in a significant way which play a vital role in global, nation and personal security. Nowadays iris recognition is getting more popular in terms of security. Iris pattern is more stable with ages, uniqueness, acceptability. Because of its high reliability and good rates of recognition, iris recognition is therefore used for highly secure locations. With the arrival of ATM banking has become much easier and it has also become more accessible. The product (ATM) it is manifold due to the highly increasing risk of intelligent criminals. Due to which the banking services are in danger and not secure. This situation is getting progressed as huge progress is made in biometric recognition techniques like fingerprint and iris scanning. Customers password can be encrypted using selective article points. Therefore, a system is needed which is more secure and provides safe transactions and also help from various frauds. This system is more secure and fast and helps to provide better facilities.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133253895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
ANN Based Design of SRR Loaded Patch Antenna for Non-Invasive Blood Glucose Monitoring 基于神经网络的SRR负载贴片天线无创血糖监测设计
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036239
Palak Tripathi, Praveen Kumar, Saurabh Raj, S. Tripathi, V. Tripathi
{"title":"ANN Based Design of SRR Loaded Patch Antenna for Non-Invasive Blood Glucose Monitoring","authors":"Palak Tripathi, Praveen Kumar, Saurabh Raj, S. Tripathi, V. Tripathi","doi":"10.1109/ISCON47742.2019.9036239","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036239","url":null,"abstract":"A novel design of a wideband antenna is proposed in this paper for monitoring the blood glucose concentration in the human body. The designed antenna uses a metamaterial in the form of a split-ring resonator (SRR) loading on a radiating patch. It has a compact size of $(14times 17times 1.57) text{mm}^{3}$. The proposed antenna has realized a gain of about 6.96 dBi and 3.65 dBi at frequencies 21.65 GHz and 25.35 GHz respectively. It has a wide band of 6.49 GHz ranging from 21.097 GHz to 27.59 GHz which covers the 5G frequency band as well. The proposed RF sensor based on SRR loaded patch antenna is simulated and fabricated in the lab for stacking with 3D models of human tissues to investigate its performance. Further, an optimization technique called, Artificial Neural Network (ANN) has also been used to optimize the antenna parameters in terms of bandwidth.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133310310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Comparative Enhancement On Hybrid Protocol With Energy Efficient Routing Using Wireless IOT Sensor Networks 基于无线物联网传感器网络的节能路由混合协议的比较增强
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036282
Ram Bhushan Agnihotri, Nitin Pandey, S. Verma
{"title":"A Comparative Enhancement On Hybrid Protocol With Energy Efficient Routing Using Wireless IOT Sensor Networks","authors":"Ram Bhushan Agnihotri, Nitin Pandey, S. Verma","doi":"10.1109/ISCON47742.2019.9036282","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036282","url":null,"abstract":"One of the creating frameworks organization rules is the opportunity among the real world and the digital world is the IoT, wherein, clever articles talk with each other, Data is collected and various solicits of customers are then acknowledged by the differently addressed data. The essentialness of capable designs for the IoT is a hectic issue as the IoT ends up being progressively astounding a direct result of its broad scale the present strategies of remote sensor frameworks can't be associated in context of IoT. Achieving the green sorted out IoT, the underlying study watches out for imperativeness profitability affairs by developing a distinct sending plan. The underlying study presents a different leveled orchestrate structure (1)Method for the essentialness capable IoT; (2)base imperativeness usage transmission figuring to execute the perfect model. The reenactment outcomes demonstrate that the improved arrangement is much imperativeness beneficial and versatile as compared to the ordinary WSN plans and consequently it will in general be executed for capable correspondence in the IoT. Extending enthusiasm for remote correspondence has gotten an enormous interest in a couple of consistent application systems. In this field of remote correspondence, remote sensor frameworks are seen as the most reassuring response for checking the different sort of prohibitive essentials. These frameworks can be passed on adequately in antagonistic and perilous circumstances. Regardless, these frameworks are energized with a compelled battery limit therefore, organize lifetime is seen as a troublesome task in this field. To vanquish this issue of framework lifetime, we develop an imperativeness procuring and essentialness the administrators show which is known as Energy Aware Buffer Management Routing show (EABMRP), to improve the framework lifetime.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129290908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Production Prediction based on News using Sentimental Analysis 基于情感分析的新闻产量预测
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036208
N. Singh, Aprna Tripathi, Vivek Kumar
{"title":"Production Prediction based on News using Sentimental Analysis","authors":"N. Singh, Aprna Tripathi, Vivek Kumar","doi":"10.1109/ISCON47742.2019.9036208","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036208","url":null,"abstract":"In the current scenario, market is changing with a drastic rate. In such a phase taking right decision at right time with respect to organization benefits is a challenging task. Industries are indented to fulfill customers need and the news plays a vital role to change the sentiments of the targeted customers. News from the online sources is mined and combined with sentiment analysis to produce the best suitable suggestions. The recommendation then given to the production based companies to speed up or speed down the production so that they could take the optimum benefits from the market. The association analysis is performed to show the words which are contextually associated with each other. The news article and its complete analysis is performed and verified.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133671595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reversible Watermarking scheme for Authentication and integrity control in Biometric Images 生物特征图像认证与完整性控制的可逆水印方案
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036232
Vishal Choudhary, M. Dutta, Abhilasha Singh
{"title":"Reversible Watermarking scheme for Authentication and integrity control in Biometric Images","authors":"Vishal Choudhary, M. Dutta, Abhilasha Singh","doi":"10.1109/ISCON47742.2019.9036232","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036232","url":null,"abstract":"In this era of digital world, authentication and integrity of biometric data is really imperative for data communication over erroneous network as well as for storage and processing in large database. In order to attain aforesaid, a watermark comprising details of ownership can be embedded in the biometric image. Further, it is required that the modified data can be reversed back to original data without any information loss, after the details are retrieved. This paper proposes a completely reversible watermarking system preventing any loss of information and solving the issues associated with biometric authentication and integrity. The proposed technique utilizes Discrete Cosine Transform (DCT) for compact features extraction. Based upon the features extracted from the original image and watermark, a secure key is generated. This key is required to retrieve the watermark from the modified image. Experimental outcomes reveal that proposed methodology gives high values of Peak Signal to Noise Ratio and Normalized Correlation which are comparable with the state-of-art work.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115333582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Attendance Monitoring System Through RFID, Face detection and Ethernet Network: A Conceptual Framework for Sustainable Campus 基于RFID、人脸检测和以太网络的考勤监控系统:可持续校园的概念框架
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036209
Princy Agarwal, V. Shukla, Richa Gupta, Shreya Jhamb
{"title":"Attendance Monitoring System Through RFID, Face detection and Ethernet Network: A Conceptual Framework for Sustainable Campus","authors":"Princy Agarwal, V. Shukla, Richa Gupta, Shreya Jhamb","doi":"10.1109/ISCON47742.2019.9036209","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036209","url":null,"abstract":"Attendance monitoring has become a very strenuous task in Schools, Colleges and Universities. Paper based attendance recording and monitoring require a significant amount of time and effort by the instructor. Most of the educational institutions in developed countries have an online system to monitor the student's attendance. Even web based attendance monitoring system takes a lot of time for this routine based task. This paper focuses on the usage of intelligent systems in classrooms for recording student's attendance that are linked to RFID technology, face detection mechanism and also based on the location of student's registered mobile device. RFID is one of the popular identification technologies used since it is cost effective and sustainable. Along with RFID, biometric face detection and location capturing (ethernet router log) makes this system fully trustworthy and along with this provides a robust platform for attendance monitoring system.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115384295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Activity Recognition by Delving deeper using CNN and RNN 使用CNN和RNN进行更深层次的活动识别
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036262
Roshan Singh, A. Kushwaha, Rajat Khurana, R. Srivastava
{"title":"Activity Recognition by Delving deeper using CNN and RNN","authors":"Roshan Singh, A. Kushwaha, Rajat Khurana, R. Srivastava","doi":"10.1109/ISCON47742.2019.9036262","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036262","url":null,"abstract":"Video content has a protagonist role in this age of data revolution. These days, computer vision research community is fascinated towards application of convolutional neural networks for various image and video analysis tasks. Recurrent Neural Networks are also used in various computer vision tasks. Introduction of residual connections in traditional CNN model to design very deep architectures known as Residual Networks are very efficient for computer vision tasks. To exploit capabilities of both CNN and RNN the proposed model is based on CRNN which is trained from scratch as well as using ResNet 152 which is pre trained on ImageNet dataset. The architecture is trained and validated on popular UCF-101 dataset on the basis of accuracy and average loss. From results, it can be observed that proposed approach provides better results than state of art methods.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123747610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信