Proceedings of the 3rd International Conference on Networking, Information Systems & Security最新文献

筛选
英文 中文
Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud 通过在云中集成SSO和MFA (Multi-Factor Authentication)来加强SAML
Nickson M. Karie, V. Kebande, R. Ikuesan, Mehdi Sookhak, H. Venter
{"title":"Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud","authors":"Nickson M. Karie, V. Kebande, R. Ikuesan, Mehdi Sookhak, H. Venter","doi":"10.1145/3386723.3387875","DOIUrl":"https://doi.org/10.1145/3386723.3387875","url":null,"abstract":"Even though the cloud paradigm and its associated services has been adopted in various enterprise applications, there has been major issues with regard to authenticating users' critical data. Single Sign on (SSO) is a user authentication technique through which a server authenticates and allows a user to use a single aspect of login credentials, for example, to access multiple services in the cloud. Even though SSO reduces the number of logins that are needed over heterogeneous environments, the risk that might be associated with the security of SSO might be detrimental if, for example, a Man-in-the Middle (MITM) attacker manages to gain control of the SSO credentials. It is also possible to get the identity of the users who have logged into Active Directory or intranet and this identity can easily be used to log into other web-based applications, and this requires the use of the Security Assertion Mark-up Language (SAML). SAML is basically a standard that allows users to be logged into applications as per their sessions. The problem that this paper addresses is the lack of a proactive technique of hardening cloud-based SAML while combining SSO with a Multi-Factor Authentication (MFA) at the time of writing this paper. The authors have, therefore, proposed an effective approach that unifies SSO with MFA in this context. Based on the base score index conducted over Common Vulnerability Scoring System (CVSS), the architecture proves to be reliable, feasible and with better performance.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131257449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Adaptation of quality for video streaming in a Bittorrent P2P IMS network Bittorrent P2P IMS网络中视频流质量的自适应
A. Ghani, E. I. Elhaj, A. Hammouch, A. Chaoub
{"title":"Adaptation of quality for video streaming in a Bittorrent P2P IMS network","authors":"A. Ghani, E. I. Elhaj, A. Hammouch, A. Chaoub","doi":"10.1145/3386723.3387824","DOIUrl":"https://doi.org/10.1145/3386723.3387824","url":null,"abstract":"The internet multimedia subsystem (IMS) has been upgraded to support Peer-to-Peer (P2P) content distribution services. Bittorent can be used with IMS, it uses an scalable process of content distribution. BitTorrent is a P2P file-sharing application designed to distribute large files to a large user population efficiently. This is done by making use of the upload bandwidth of all nodes (called peers) downloading the file. The peer heterogeneity constraint imposes a challenge that is the guarantee of a certain level of Quality of Service (QoS) of the video for the different peers, and the transfer poses a challenge for maintaining quality of service (QoS) in IMS. In parallel of P2P development, recently, video coding standards have appeared, which are enabling the deployment of video content delivery over Internet in real-time with high QoS. In this article we have linked the Scalable Video Coding (SVC) quality adaptation model with the BitTorrent protocol and the IMS network, knowing that the file to be downloaded by the Bittorrent protocol is divided into several chunks, we exploited the chunks selection technique used by Bittorrent to link the SVC coding quality adaptation model with the bittorrent protocol and the P2P IMS network. We performed several simulations with the bittorent protocol to extract the following parameters(Start Time, first Chunk Time, last Chunk Time, Stop Time, dwonload Duration), we made a comparison between the P2P Bittorent protocol and the P2P Zeta protocol.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124458045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new Framework to improve Change Mining in Configurable Process 改进可配置过程中变化挖掘的新框架
A. Hmami, Hanae Sbaï, M. Fredj
{"title":"A new Framework to improve Change Mining in Configurable Process","authors":"A. Hmami, Hanae Sbaï, M. Fredj","doi":"10.1145/3386723.3387853","DOIUrl":"https://doi.org/10.1145/3386723.3387853","url":null,"abstract":"The configurable process model is an important approach to reduce the redundancy involved in modeling, reengineering, and adapting a business process with its environment. While process mining approaches aim to discover and, verify conformance and enhance a process, connecting configurable processes and process mining shows considerable improvements, especially in terms of time and cost. However, the configurable process has rarely been applied in change mining. Our goal in this paper is to highlight the importance of using variability to improve change mining from a collection of event logs. We propose a framework that can detect and recommend changes, by mining changes from a collection of event logs. The main purpose is to allow engineers and business process designers to easily adjust business process with the environment changes.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125019435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Survey on QoS-based communication protocols for IoT systems 物联网系统基于qos的通信协议研究进展
Nogaye Lo, I. Niang
{"title":"A Survey on QoS-based communication protocols for IoT systems","authors":"Nogaye Lo, I. Niang","doi":"10.1145/3386723.3387834","DOIUrl":"https://doi.org/10.1145/3386723.3387834","url":null,"abstract":"Internet of Things (IoT) contributes to development of world through its technological contributions and its daily applications. Several technologies and protocols are used for the implementation of new applications allowing physical objects to connect with each other in support of smart decision-making. To provide efficient and reliable services to its end-users, it guarantees the quality of its pragmatic use by referring to QoS criteria.This implies efficient management of the quality of service in IoT systems in order to meet requirements of their applications. In this paper, we offer an analysis of quality of service mechanisms of communication protocols in IoT environment. This study opens a new perspective of dynamic QoS management.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123895887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Real-time Prediction of Accident using Big Data System 基于大数据系统的事故实时预测
Mouad Tantaoui, M. Laanaoui, M. Kabil
{"title":"Real-time Prediction of Accident using Big Data System","authors":"Mouad Tantaoui, M. Laanaoui, M. Kabil","doi":"10.1145/3386723.3387886","DOIUrl":"https://doi.org/10.1145/3386723.3387886","url":null,"abstract":"In this paper, we propose a new prediction system in real time using Big Data to improve the VANET network. Firstly, The Traffic density and average speed are calculated in each section of road, and then the risk of vehicle accident is predicted in instantaneous manner with parallel data processing, which makes execution faster.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122822447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smartphone learning for Kids edutainment 儿童智能手机学习寓教于乐
E. Zigh, Ayoub Elhoucine, Abderrahmane Mallek, M. Kadiri, Kouninef Belkacem, T. Ensari
{"title":"Smartphone learning for Kids edutainment","authors":"E. Zigh, Ayoub Elhoucine, Abderrahmane Mallek, M. Kadiri, Kouninef Belkacem, T. Ensari","doi":"10.1145/3386723.3387862","DOIUrl":"https://doi.org/10.1145/3386723.3387862","url":null,"abstract":"Learning should be the preparation of young students (kids) for new ways of thinking: ways that involve creativity, critical analysis, problem solving and decision-making. We propose in this article, a smartphone learning approach using a designed robot car for children. It is a package that could been introduced for kids edutainment in Algeria. In order to be exploited outside Algeria, a software part could been modified according to the educational need of other kids around the world. A designed package includes an android application and a robot car. This last is remotes controlled via a smartphone application. This software part consists into three edutainment games quiz related to three levels respectively. Therefore, the further kid moves into the game, the more control he has over the robot car. A child is enjoying his educational toy and learning in attractive context at the same time. The remote control results are validated, using hardware prototype.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125052090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Definition and Implementation of an Elliptic Curve Cryptosystem using a New Message Mapping Scheme 使用新消息映射方案的椭圆曲线密码系统的定义与实现
Lahraoui Younes, Amal Youssef, S. Lazaar
{"title":"Definition and Implementation of an Elliptic Curve Cryptosystem using a New Message Mapping Scheme","authors":"Lahraoui Younes, Amal Youssef, S. Lazaar","doi":"10.1145/3386723.3387893","DOIUrl":"https://doi.org/10.1145/3386723.3387893","url":null,"abstract":"Elliptic curve cryptography (ECC) is strongly requested for encryption and decryption processes since its guarantees high level of data security, insured by small key sizes that usually lead to fast algorithms. Such processes can only deal with points on elliptic curves on which the message has to be mapped. In this paper, we define a new message mapping algorithm coupled with Elgamal encryption based on an elliptic curve defined over a finite prime field. The established algorithm will be implemented and discussed for a chosen plaintext corresponding to an integer message. Our numerical tests demonstrate that the execution time of the message mapping, encryption, reverse message mapping and decryption, increase linearly versus data sizes. These results are promising for the design of fast and secure cryptosystems desirable for implementations on constrained environments.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"23 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123732089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Recidivism forecasting: A study on process of feature selection 累犯预测:特征选择过程的研究
A. Azeroual, Youssef Taher, B. Nsiri
{"title":"Recidivism forecasting: A study on process of feature selection","authors":"A. Azeroual, Youssef Taher, B. Nsiri","doi":"10.1145/3386723.3387848","DOIUrl":"https://doi.org/10.1145/3386723.3387848","url":null,"abstract":"Across the world, there are several factors attributed to high crime rates. The prevention of and the fight against crimes is a major concern of all countries. In the era of globalization and new information and communication technologies, reducing these crimes rate by using conventional methods (law enforcement, social interventions...) are not enough. In fact, they have many limits. Today, by analyzing a large volume of crimes data with machine learning algorithms, researchers can take important advantage of these technologies, especially in the context of the world's famous problem of recidivism. By using these recent innovations, security departments can predict how, when, and where reoffending will happen before it actually happens. However, the efficiency, the quality, and the accuracy of these forcasting models and software depend on several factors. The process of feature selection is one of these key factors. By improving the quality of this process, we can reduce over fitting and eliminating redundant data as well as training time. In this context, this investigation paid particular attention to the process of recidivism features selection (first phase of our future recidivism forcasting framework). Based on detailed study of recidivism theoretical factors, previous and recent methods used in recidivism features selection, we present a comparative study on all key elements used in this phase (features, categories of features and methods of features selection). Our main objective is to prepare an important knowledge database for recidivism features. This database will take into account different sets of recidivism features obtained by all previous and recent projects. It will also be used in our recidivism forcasting framework.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129520106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using machine learning to deal with Phishing and Spam Detection: An overview 使用机器学习处理网络钓鱼和垃圾邮件检测:概述
Oumaima El Kouari, H. Benaboud, S. Lazaar
{"title":"Using machine learning to deal with Phishing and Spam Detection: An overview","authors":"Oumaima El Kouari, H. Benaboud, S. Lazaar","doi":"10.1145/3386723.3387891","DOIUrl":"https://doi.org/10.1145/3386723.3387891","url":null,"abstract":"Cybersecurity is a growing field that requires a lot of attention due to the remarkable progress made in social networks, cloud and web technologies, online banking, mobile environment, smart networks, etc. Various approaches have been developed to solve many computer security problems, including those based on machine learning. This paper examines and highlights the various works using machine learning in network security. Two types of detection are discussed. Phishing detection and Spam detection. For each type, related work is presented and some proposed methods in the literature are compared taking into account their accuracy and other characteristics.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133726997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Fireworks Algorithm for Frequency Assignment Problem 频率分配问题的Fireworks算法
El Bouti Mohamed, El Ghazi Raouan, Benameur Lamia, A. Jihane
{"title":"Fireworks Algorithm for Frequency Assignment Problem","authors":"El Bouti Mohamed, El Ghazi Raouan, Benameur Lamia, A. Jihane","doi":"10.1145/3386723.3387823","DOIUrl":"https://doi.org/10.1145/3386723.3387823","url":null,"abstract":"In this paper, a new approach to resolve the problem of frequency assignment problem is proposed. (FAP) is well known in the NP-complete problems and can be modeled as an optimization problem, which the objective is to minimize the costs due to interference generated by a solution. The fireworks algorithm (FWA) is proposed for solving FAP. FWA is a recently developed swarm intelligence algorithm. FWA is a meta-heuristic method and has a good convergence property and can always find the global optimal solutions.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130003406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信