{"title":"Holistic analysis of mix protocols","authors":"G. Bella, Denis Butin, David Gray","doi":"10.1109/ISIAS.2011.6122843","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122843","url":null,"abstract":"Security protocols are often analysed in isolation as academic challenges. However, the real world can require various combinations of them, such as a certified email protocol executed over a resilient channel, or the key registration protocol to precede the purchase protocols of Secure Electronic Transactions (SET). We develop what appears to be the first scalable approach to specifying and analysing mix protocols. It expands on the Inductive Method by exploiting the simplicity with which inductive definitions can refer to each other. This lets the human analyst study each protocol separately first, and then derive holistic properties about the mix. The approach, which is demonstrated on the sequential composition of a certification protocol with an authentication one, is not limited by the features of the protocols, which can, for example, share message components such as cryptographic keys and nonces. It bears potential for the analysis of complex protocols constructed by general composition of others.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125473922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensemble based categorization and adaptive model for malware detection","authors":"M. N. A. Zabidi, M. A. Maarof, A. Zainal","doi":"10.1109/ISIAS.2011.6122799","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122799","url":null,"abstract":"Malware, a term which was derived from two words; malicious software has caused many problem to the computer users throughout the world. Previously was known as many names; trojan, virus, worms, dialers and many others, thid potientially unwanted software simply labeled as malware. Malware is a software, which works as any other benigh software, but was designed to accomplish the goal of its writers. It was written to exploit the vulnerability of the target victim's operating system or application. Previously was a primitive and easy to detect, it evolves to a sophisticated and professionally written piece of software. Current malware detection method involved string search algorithm which based on the pattern detection. This may include the use of signature based method. In this paper, we propose an ensemble categorization by using ensemble classification and clustering together with adaptive learning model.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"304 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115857258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of digital audio watermarking techniques for the security of VOIP communications","authors":"Füsun Er, E. Gul","doi":"10.1109/ISIAS.2011.6122787","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122787","url":null,"abstract":"In this paper, the authors present digital audio watermarking techniques that can be used for source origin authentication in real-time Session Initiation Protocol (SIP) Communications, such as Voice over IP (VoIP). The watermark-enabled VoIP mechanism utilizes audio watermarking techniques as a covert channel between calling parties to send source origin indicator information during the transportation phase of VoIP. The effects of audio watermarking were measured using the Signal-to-Noise Ratio, watermark extract durations and the effects of a-law, u-law and GSM encoding during the transportation phase of VoIP. Moreover, various audio watermarking algorithms were implemented to demonstrate the applicability of aforementioned security solution in terms of certain parameters: robustness, evaluation times, complexity and capacity. The experimental results suggest that some watermarking algorithms are applicable in VoIP, while others are not suitable for source origin authentication.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129574101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sui-Guan Teo, Kenneth Koon-Ho Wong, E. Dawson, L. Simpson
{"title":"State convergence and the effectiveness of time-memory-data tradeoffs","authors":"Sui-Guan Teo, Kenneth Koon-Ho Wong, E. Dawson, L. Simpson","doi":"10.1109/ISIAS.2011.6122801","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122801","url":null,"abstract":"Various time-memory tradeoffs attacks for stream ciphers have been proposed over the years. However, the claimed success of these attacks assumes the initialisation process of the stream cipher is one-to-one. Some stream cipher proposals do not have a one-to-one initialisation process. In this paper, we examine the impact of this on the success of time-memory-data tradeoff attacks. Under the circumstances, some attacks are more successful than previously claimed while others are less. The conditions for both cases are established.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129824766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A two-tier energy-efficient secure routing protocol for Wireless Sensor Networks","authors":"A. El-Semary, M. Abdel-Azim","doi":"10.1109/ISIAS.2011.6122842","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122842","url":null,"abstract":"Recently, Wireless Sensor Networks (WSNs) have been deployed into a variety of applications including homeland security, military systems, and health care. Sensor nodes deployed in such networks are subject to several attacks such as sinkhole and select forwarding. Therefore, developing secure and energy-efficient routing protocols to protect WSNs against these attacks while efficiently utilize the energy of the deployed nodes has become imperative. Several routing protocols have been proposed in the literature. However, most of these protocols forward packets based on information collected from neighbor nodes. This allows a malicious sensor node to deceive its neighbor to forward their packets through it. This makes the network's nodes vulnerable to various types of attacks such as sinkhole, spoofing, and select forwarding attacks. Therefore, this paper proposes a two-tier energy-efficient secure routing protocol for WSNs in which each sensor node forwards its packets based on its own information. Thus it cannot be deceived by any other sensor node. Simulation results indicate clearly that, the performance of the proposed protocol outperforms that of both the Path Energy Weight and the minimum hop protocols under several attacks such as sinkhole and spoofing or Sybil attacks. In addition, the proposed protocol exhibits a grateful performance under attack-free conditions and evenly distributes the network loads among the deployed nodes to prolong the network life time.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128632470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Access control taxonomy for social networks","authors":"Adnan Ahmad, B. Whitworth","doi":"10.1109/ISIAS.2011.6122829","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122829","url":null,"abstract":"Social networks are online platforms where users form relationships with others by sharing resources. Access control for these social networks is different from other systems as it fulfills the social requirements of community as well as the technical requirements of the system. This paper presents a classification of access control models for social networks based on lattice taxonomy where axes represent the properties of the models. The proposed taxonomy has eight axes representing: requestor identity, mapping authority, resource control, relationship management, credential distribution, access control decisions, rights delegation and transparency. Analysis of existing models using this taxonomy highlights the tradeoffs between user control, state distribution and social needs. The taxonomy reveals that various interesting features of social networks have not been implemented yet and there is a gap between the social requirements and access control features of social networks.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121103005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A secure joint wavelet based steganography and secret sharing method","authors":"Mohammad Javad Khosravi, S. Ghandali","doi":"10.1109/ISIAS.2011.6122823","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122823","url":null,"abstract":"In this paper a novel steganography technique based on the combination of a secret sharing method and wavelet transform is presented. In this method, a secret image is shared into some shares. Then, the shares and Fletcher- 16 checksum of shares are hidden into cover images using an integer wavelet based steganography technique. In the decoding part, the stego images are used to recover the shares and, consequently, recover the secret image. The presented algorithm obtains high authentication capability against counterfeiting. Moreover; it is stable against serious attacks, including RS and supervisory training steganalysis methods, and it has the low detection rate under global feature extraction classifier examination.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115987694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information security awareness in university: Maintaining learnability, performance and adaptability through roles of responsibility","authors":"A. R. Ahlan, M. Lubis","doi":"10.1109/ISIAS.2011.6122827","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122827","url":null,"abstract":"As the 21st century approached, the current trend of technology product besides deliver the benefit on availability and accessibility on information, problem emerged regard information security. In order to analyze on how technology introduces new risks, it is necessary to discuss the technology lifecycle. Consider for instance the life cycle of technology as the diffusion of an innovation. Since technological innovations or IT solutions are being adopted to support business processes, the need to protect those IT solutions arises with its adoption. Accordingly, two important factors need much consideration in raising awareness are how organization influences significantly of end user's attitude and how the organization has the regular assessment or evaluation to measure the effectiveness of IS awareness policy inside the organization.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126194440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hajar Al-Hujailan, Mznah Al-Rodhaan, A. Al-Dhelaan
{"title":"A cooperative intrusion detection scheme for clustered mobile ad hoc networks","authors":"Hajar Al-Hujailan, Mznah Al-Rodhaan, A. Al-Dhelaan","doi":"10.1109/ISIAS.2011.6122816","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122816","url":null,"abstract":"A mobile ad hoc network is a collection of wireless mobile devices communicating with each other and forming a temporary network, without any pre-deployed infrastructure. Security in MANET is a main and important element for the basic functions of a network. One of the security technologies is intrusion detection system which provides a second line of defense. In this paper, we propose an efficient defense system based on a cooperative scheme to deal with intrusions in clustered ad hoc networks. Our proposed system provides security against all network attacks that can be detected by any node in the network, in particular detects the actor. It is simple, reliable, effective and its performance not affected by status of channel.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126852438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fields","authors":"Simona Samardjiska, Yanling Chen, D. Gligoroski","doi":"10.1109/ISIAS.2011.6122839","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122839","url":null,"abstract":"In this paper we describe two methods for constructing Multivariate Quadratic Quasigroups (MQQ) in Galois fields of any characteristic and order. Our constructions extend the previously known constructions defined for operations over the prime field of characteristic 2. Application of these new constructions can reduce the public key size of the recently introduced family of public key schemes based on MQQs up to 58 times.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127027404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}