Tanjim Munir Dipon, Md. Shohrab Hossain, Husnu S. Narman
{"title":"Detecting Network Intrusion through Anomalous Packet Identification","authors":"Tanjim Munir Dipon, Md. Shohrab Hossain, Husnu S. Narman","doi":"10.1109/ITNAC50341.2020.9315029","DOIUrl":"https://doi.org/10.1109/ITNAC50341.2020.9315029","url":null,"abstract":"Rule based intrusion detection depends on the attack signature database which has to be constantly updated, requiring time and efforts. Anomaly based intrusion detection through unsupervised methods does not require comparing with attack signatures. However, detecting anomalous behaviour is a complex task. In this paper, we have proposed an unsupervised approach for anomalous network traffic identification by combining dimensionality reduction with sub-space clustering. Our approach takes the attribute values from network traffics as input, performs principal component analysis on them, and then applies density-based clustering on each possible three dimensional sub-spaces to rank the outliers. Results show that our proposed approach detects a wide range of anomalous network session which included instances of intrusive sessions too. The evaluation of this approach showed significant accuracy and faster detection with a zero false negative rate, implying that no instance of the listed attacks went undetected.","PeriodicalId":131639,"journal":{"name":"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131808079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain","authors":"Stanisław Barański, J. Konorski","doi":"10.1109/ITNAC50341.2020.9315048","DOIUrl":"https://doi.org/10.1109/ITNAC50341.2020.9315048","url":null,"abstract":"Information-centric networks struggle with content poisoning attacks (CPAs), especially their stronger form called Fake Data CPA, in which an intruder publisher uploads content signed with stolen credentials. Following an existing graph-infection based approach leveraging the constrained time when stolen credentials are useful, we design a blockchain-based mitigation scheme for Named Data Networking architectures. We postulate Proof-of-Time verification to distinguish between intruder and legitimate publishers, and argue that blockchain solutions can implement it natively. The proposed scheme, using the Federated Byzantine Agreement protocol, is described in detail and found to be a valuable alternative to the graph-infection approach, superior with respect to outcome determinism, resiliency, and fault tolerance.","PeriodicalId":131639,"journal":{"name":"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131894875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-State Border Gateway Protocol for Multi-Domain Software Defined Networking–Based Gateways","authors":"H. Alotaibi, M. Gregory, Shuo Li, Hoang Do","doi":"10.1109/ITNAC50341.2020.9315044","DOIUrl":"https://doi.org/10.1109/ITNAC50341.2020.9315044","url":null,"abstract":"Border Gateway Protocol (BGP) is a path-vector routing protocol used to exchange routing and reachability information between autonomous system (AS) that offers flexibility and scalability. BGP is capable of handling scalability issues using classless inter-domain routing and is more efficient than alternatives. However, BGP related challenges have been encountered, including growing routing tables, load balancing issues, hijacking, and AS transit delays, leading to increased convergence delay. Convergence delay is the time gap between the commencement of the best-path selection process and when the router is updated. Convergence delay has become a significant issue for larger networks because frequent routing path updates can lead to network instability. Network instability causes packet loss, delayed packet delivery and occasional loss of network connectivity. The research aims to incorporate Software Defined Networking (SDN) technology with gateway operation to reduce the BGP convergence time.","PeriodicalId":131639,"journal":{"name":"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116201487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reference-free Detection of LSB Steganography Using Histogram Analysis","authors":"Natiq M. Abdali, Z. M. Hussain","doi":"10.1109/ITNAC50341.2020.9315037","DOIUrl":"https://doi.org/10.1109/ITNAC50341.2020.9315037","url":null,"abstract":"Due to the difficulty of obtaining a database of original images that are required in the classification process to detect tampering, this paper presents a technique for detecting image tampering such as image steganography in the spatial domain. The system depends on deriving the auto-correlation function of the image histogram, then applying a high-pass filter with a threshold. This technique can be used to decide which image is cover or a stego image, without adopting the original image. The results have eventually revealed the validity of this system. Although this study has focused on least-significant-bit (LSB) steganography, we expect that it could be extended to other types of image tapering.","PeriodicalId":131639,"journal":{"name":"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129322428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MOBDroid: An Intelligent Malware Detection System for Improved Data Security in Mobile Cloud Computing Environments","authors":"Noah Oghenefego Ogwara, K. Petrova, M. Yang","doi":"10.1109/ITNAC50341.2020.9315052","DOIUrl":"https://doi.org/10.1109/ITNAC50341.2020.9315052","url":null,"abstract":"We propose an intelligent malware detection system (MOBDroid) that aims to protect the end-user’s mobile device (MD) in mobile cloud computing (MCC) environment. MOBDroid utilizes the Android Operating System (OS) permission-based security system. The APK files of 28,306 benign and malicious applications (apps) collected from the AndroZoo and RmvDroid malware repositories were used in the system development process. The apps were decompiled in order to extract their manifest files and construct a dataset comprising the permissions requested by each of the apps. We identified some unique permissions that could be used to distinguish between malicious and benign apps and performed a series of experiments using a machine learning (ML) model; the model drew on the ML.net library and was implemented in C#.net. In the experiments conducted, we obtained classification accuracy of 96.89%, a detection rate of 98.65%, and false negative rate of 1.35%. The results indicate that our model compares very favorably to other models reported in the extant literature.","PeriodicalId":131639,"journal":{"name":"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115795320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On-Demand Blind Packet Forwarding","authors":"I. Simsek","doi":"10.1109/ITNAC50341.2020.9315187","DOIUrl":"https://doi.org/10.1109/ITNAC50341.2020.9315187","url":null,"abstract":"Network Address Confidentiality (NAC) classifies all third parties and network nodes as adversaries and limits access to the network packet addresses in cleartext exclusively to the communicating endpoints. NAC implies certain anonymity properties, namely sender/recipient and relationship unlinkabilities. Blind Packet Forwarding (BPF) realizes NAC and its unlinkability properties by redesigning the packet forwarding and its associated network functions to blind ones transferring and processing packet addresses in end-to-end encrypted form. BPF defines two modes. In the semi-blind mode, NAC and its unlinkability properties apply only to communicating endpoints, while the fully blind mode provides these security properties for communicating endpoints as well as domains and local networks. However, the full blindness in a domain requires to set up and maintain masked routing tables within the entire domain, which is a costly process. This paper proposes multiple approaches for different cases to selectively set up masked routing table entries and to perform the full blindness on demand. Moreover, we present our prototype implementation and its evaluation by means of an adjusted OpenFlow version and multiple scenarios respectively.","PeriodicalId":131639,"journal":{"name":"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115217265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Silvia Mignardi, M. J. Arpaio, C. Buratti, E. Vitucci, F. Fuschini, R. Verdone
{"title":"Performance Evaluation of UAV-Aided Mobile Networks by Means of Ray Launching Generated REMs","authors":"Silvia Mignardi, M. J. Arpaio, C. Buratti, E. Vitucci, F. Fuschini, R. Verdone","doi":"10.1109/ITNAC50341.2020.9315177","DOIUrl":"https://doi.org/10.1109/ITNAC50341.2020.9315177","url":null,"abstract":"Unmanned Aerial Vehicles (UAV), also known as drones, are receiving increasing attention as enablers for many emerging technologies and applications, a trend likely to continue in the next future. In this regard, using Unmanned Aerial Base Stations (UABSs), i.e. base stations carried by UAVs, is one of the most promising means to offer coverage and capacity in 5G applications to those users that are not being served by terrestrial base stations. In this paper, we propose a novel approach for trajectory design and Radio Resource Management (RRM) in UAV-aided networks using information retrieved from precise Radio Environmental Map (REM) based on Ray Launching (RL) simulations for RF propagation and narrow band estimations. Furthermore, we consider different possible models for antennas to be installed on multiple UABSs as well as proper RRM strategies which are able to take advantage of REM inputs. Simulation results will show the performance achieved by the system for the different approaches and it will compare them with the previous use of statistical models.","PeriodicalId":131639,"journal":{"name":"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132620009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WP4: A P4 Programmable IEEE 802.11 Data Plane","authors":"Paul Zanna, P. Radcliffe, D. Kumar","doi":"10.1109/ITNAC50341.2020.9315141","DOIUrl":"https://doi.org/10.1109/ITNAC50341.2020.9315141","url":null,"abstract":"IEEE 802.11 wireless networking is now one of the most common methods of connectivity, and with it, a new range of security and reliability issues. While a Software Defined Networking (SDN) approach has made significant inroads with these problems in wired networks, the impact has not been as notable in the wireless networking space. One reason for this is that the existing SDN approach, predominately OpenFlow, is restricted to the network interface level as their match-action pipelines are only capable of processing Ethernet frames and cannot, therefore, address the underlying wireless elements. The introduction of the P4 programming language allows developers to create custom data planes which can include definable packet parsers. This functionality enables the construction of data planes capable of parsing IEEE 802.11 wireless frames. In this paper, we develop a new P4 compiler extension called WP4 to enable the creation of a P4 data plane accessible by a Linux wireless driver. It allows the processing of previously inaccessible management frames such as beacons, probes and de-authentication. Finally, we provide example scenarios for this novel approach and a performance evaluation of the WP4 implementation.","PeriodicalId":131639,"journal":{"name":"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133463468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
James Yockey, Benjamin Campbell, A. Coyle, R. Hunjet
{"title":"Emulating Low Probability of Detection Algorithms","authors":"James Yockey, Benjamin Campbell, A. Coyle, R. Hunjet","doi":"10.1109/ITNAC50341.2020.9315105","DOIUrl":"https://doi.org/10.1109/ITNAC50341.2020.9315105","url":null,"abstract":"Software Defined Radios (SDRs) can be used to create and modify radio waveforms in order to perform research into various wireless network problems. Defence Science and Technology Group (DSTG) has created the Experimental Framework of SDRs (EFOS) incorporating bespoke SDRs communicating with one another through an RF attenuation matrix. The Harlequin scenario planning software is used to create scenarios using a set of units, and then calculate the radio propagation matrix for this network. This matrix is fed into a Radio Frequency (RF) attenuator, which is used to modify the communications between the SDRs, creating a realistic radio environment. EFOS is described and then demonstrated using a Low Probability of Detection (LPD) power control problem on a simple network.","PeriodicalId":131639,"journal":{"name":"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132873653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Attendance System in an Enterprise-Based Access Point Environment","authors":"Temitope Odewole, Rajan Kadel","doi":"10.1109/ITNAC50341.2020.9315148","DOIUrl":"https://doi.org/10.1109/ITNAC50341.2020.9315148","url":null,"abstract":"Attendance is of great importance in our daily activities as it determines performance, productivity and accountability in workplaces, classrooms, and other organizations but this has been an arduous task especially in a large enterprise. The relationship between Media Access Control (MAC) address of smart devices of users and the Received Signal Strength (RSS) from user device at Wireless Access Point (WAP) has been proven to be the way out. However, there are some factors such as the location of a WAP, type of Wi-Fi technology, security concerns, Angle of Arrival (AoA) of the received signal, etc. that were not considered for possible improvement on accuracy. This paper presents a smart attendance system for an organisation using enterprise AP. The proposed attendance system uses RSS and AoA for better accuracy and results. The paper also present comparison results on threshold RSS value and accuracy of attendance for IEEE802.11a and IEEE802.11g Wi-Fi standards.","PeriodicalId":131639,"journal":{"name":"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"06 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129127497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}