{"title":"An Instant Messaging Intrusion Detection System Framework: Using character frequency analysis for authorship identification and validation","authors":"A. Orebaugh","doi":"10.1109/CCST.2006.313445","DOIUrl":"https://doi.org/10.1109/CCST.2006.313445","url":null,"abstract":"The medium of instant messaging (IM) is a well-established means of fast and effective communication. However, a framework for analysis of instant messaging has gone largely unexplored until now. This paper explores instant messaging authorship identification and validation in terms of an author profiling framework and an anomaly-based intrusion detection system (IDS). The framework includes author behavior categories, which are the set of characteristics that remain relatively constant for a large number of messages written by the author. Specific topics include user pattern analysis, user profiling, categorization, computational linguistics, data mining, and anomaly detection. The experiments focus on applying character frequency analysis to IM messages for authorship identification and validation. This addresses the questions; can we identify an author of an IM conversation based strictly on user behavior, do different conversations with a single user look similar, do conversations with different users look different, and what is the demarcation between similar and different? Another experiment focuses on applying an instance-based learning algorithm to the character frequency of IM user messages for authorship identification and validation. The experiment applies the nearest-neighbor classification method to classify messages. It also calculates a degree of confidence to validate the identity of the IM user","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115897859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Force Protection Sensor Selector","authors":"L. Peck, R. Bates","doi":"10.1109/CCST.2006.313427","DOIUrl":"https://doi.org/10.1109/CCST.2006.313427","url":null,"abstract":"Force protection sensor selector (FPSS) is a computer application that assists security personnel in the selection of exterior intrusion detection systems best suited for maintaining force protection and physical security at a site. The FPSS software ranks intrusion detection system (IDS) suitability on the basis of known environmental impacts on sensor systems and expected operating conditions. The ranking is done both for probability of detection (Pd) and nuisance alarm rate (NAR)","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115909396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Practical High-Frequency Sonar for Intruder Detection in Very Shallow Environments","authors":"S. Younghouse","doi":"10.1109/CCST.2006.313424","DOIUrl":"https://doi.org/10.1109/CCST.2006.313424","url":null,"abstract":"An active high-frequency sonar system has been identified that is appropriate for detection and classification of human-sized targets in very shallow littoral environments. The system uses technology that is currently in use in fisheries acoustics. This technology has been optimized over the last few decades to provide a robust, cost-effective solution for detection of biological targets in cluttered environments. These systems have been proven over many years of use in fish detection applications, and as such are potentially suitable for deployment in security applications in the near future. In this presentation we will discuss important characteristics of the technology, as well as steps that are being taken towards its adaptation for security use","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115164439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Martinez-Diaz, Julian Fierrez, F. Alonso-Fernandez, J. Ortega-Garcia, J.A. Siguenza
{"title":"Hill-Climbing and Brute-Force Attacks on Biometric Systems: A Case Study in Match-on-Card Fingerprint Verification","authors":"M. Martinez-Diaz, Julian Fierrez, F. Alonso-Fernandez, J. Ortega-Garcia, J.A. Siguenza","doi":"10.1109/CCST.2006.313444","DOIUrl":"https://doi.org/10.1109/CCST.2006.313444","url":null,"abstract":"In this paper, we study the robustness of state-of-the-art automatic fingerprint verification systems against hill climbing and brute-force attacks. We compare the performance of this type of attacks against two different minutiae-based systems, the NIST Fingerprint Image Software 2 (NFIS2) reference system and a Match-on-Card based system. In order to study their success rate, the attacks are analyzed and modified in each scenario. We focus on the influence of initial conditions in hill-climbing attacks, like the number of minutiae in the synthetically generated templates or the performance of each type of modification in the template. We demonstrate how slight modifications in the hill-climbing algorithm lead to very different success rates","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129227162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Perceptions of Retinal Imaging Technology for Identifying Livestock Exhibits","authors":"C. Blomeke, B. M. Howell, S.J. Elliott","doi":"10.1109/CCST.2006.313443","DOIUrl":"https://doi.org/10.1109/CCST.2006.313443","url":null,"abstract":"This paper outlines the results of an online survey about the perceptions of Indiana 4-H Youth Educators on the use of retinal imaging for the purpose of identifying 4-H livestock projects. Indiana has begun a three year implementation period of retinal imaging and doing away with nose printing as the method of permanent livestock identification. The perceptions relate to the benefits and disadvantages of utilizing retinal imaging technology and the reasons why a particular educator decided to purchase or not purchase the equipment during the first year of the implementation","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122313537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A System and Method for Enhanced Psychophysiological Detection of Deception, Assured Client Verificaition with Remote Processing","authors":"W.I. Ames, J. Gouin","doi":"10.1109/CCST.2006.313467","DOIUrl":"https://doi.org/10.1109/CCST.2006.313467","url":null,"abstract":"The Diogenes Digital Voice Stress Analysistrade technology for measurement of micro-dynamics of autonomic micro-tremor responses is mature, provides a highly reliable and validated truth or deception system. The process generates real-time signatures that can be observed, quantified, and further compared with validated standardized criteria to assure highly and reliable conclusions of truth or deception. The initial investigative tool developed, The Lanterntrade was a technically superior truth and deception application using Microsoft operating systems and proven operating procedures (protocols) applied using unique Audiographictrade software. The Lanterntrade has been continuously upgraded to take advantage of the latest processors and peripherals as our second generation, the LantemProtrade, which is now meeting new international and domestic requirements, while becoming the engine to a large set of innovative biometric associated validated applications and processing tools and venues. Diogenes Digital Voice Stress Analysistrade systems software provides a relatively new way to measure truth and deception; especially when now combined with other biometric tools to assure accurate and physically undemanding, non-invasive subject verification, provides for a valuable security tool. Delivered by in-person or remote, structured verbal interactions, psychological cues, providing accurate, repeatable and dependable results. Recording the subject's voice for analysis can be accomplished face-to-face, or remotely using telephony. LantemProtrade is universal, when used in the subject's culture and language","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125621525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Imagery Library for Intelligent Detection Systems (i-LIDS); A Standard for Testing Video Based Detection Systems","authors":"iMars Team","doi":"10.1109/CCST.2006.313432","DOIUrl":"https://doi.org/10.1109/CCST.2006.313432","url":null,"abstract":"The Home Office Scientific Development Branch (HOSDB) evaluates intelligent CCTV and video-based detection systems (VBDS) for security and policing purposes. The commercial market for VBDS is diverse and continues to grow rapidly, yet there are no current standards to assess the performance of these systems. Many government users would like to use VBDS for outdoor applications. However, the systems tend to struggle with changing environmental conditions such as moving shadows and lighting changes. In order to be able to rapidly and reliably assess the performance of VBDS, HOSDB in partnership with the security service has produced a video test library, i-LIDS (imagery library for intelligent detection systems), a sample of which was released on DVD in 2005. The principal aim of i-LIDS is to provide a collection of CCTV images that can be used to provide typical real-world footage for research groups to use in their development programmes; and to evaluate the performance of video-based detection systems (VBDS) against government requirements","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128682905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Study on Planning and Building a Cyber Forensic Laboratory in MJIB, Taiwan, R.O.C","authors":"So-Lin Yen, Sou-Chan Chen","doi":"10.1109/CCST.2006.313464","DOIUrl":"https://doi.org/10.1109/CCST.2006.313464","url":null,"abstract":"The problems of safeguarding cybersecurity have gotten much worse in recent years. The risks in cybersecurity are increasing rapidly in our country. Because the cybersecurity defense and computer crime investigation system of our government and businesses have been threatened, the damage of cybercrime for the national security and public security will be more critical, even more than the violence crime and economic crime. The national cyber forensics mechanism and laboratory will play a very crucial role in dealing with cybercrime. In 2003 our government conducted a research of digital evidence, the standard procedure of operation and cyber forensic laboratory. It included the organization, training, technical capability, legislation and operation procedures. In 2004 the government made a policy to build the first nationwide cyber security and forensic laboratory. It will be one of the major cybersecurity defense mechanisms in our country. Our bureau (MJIB) had made a plan and got the additional budget to build a cyber forensic lab this year. This study has four aspects: 1) the study of reliable cyber forensic software and hardware; 2) the standard of operating procedure of cyber forensics; 3) the training courses for examiner, including the internationally well-known certification system in cyber forensics; and 4) the study of certification of cyber forensic laboratory. Cyber forensics is still at its early stage in Taiwan. More professional cyber forensic manpower is needed, as well as a certified cyber forensic mechanism. It is expected that cyber forensic will become increasingly important for cybersecurity policy and management in the future. Hence, building a certificated laboratory and establishing the SOP of cyber forensics from this study can be a basis to cultivate cyber forensic capability in our country. In this way the law enforcement will get more help from our laboratory. The laboratory through its operation also enhances the ability of Taiwan's cyber forensic professionals and provides more convincing digital evidence in the court. Furthermore, it can consolidate cybersecurity system and e-Taiwan environment","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125465749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Faúndez-Zanuy, Joan Fabregas, M. A. Ferrer-Ballester, C. Travieso-González, J. B. Alonso
{"title":"Evaluation of supervised vs. non supervised databases for hand geometry identification","authors":"M. Faúndez-Zanuy, Joan Fabregas, M. A. Ferrer-Ballester, C. Travieso-González, J. B. Alonso","doi":"10.1007/978-3-540-73007-1_136","DOIUrl":"https://doi.org/10.1007/978-3-540-73007-1_136","url":null,"abstract":"","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"18 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120821769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental Validation of An Intelligent Detection and Response Strategy for Complex Infrastructure Attacks and False Positives Using Firewalls","authors":"E. Hooper","doi":"10.1109/CCST.2006.313458","DOIUrl":"https://doi.org/10.1109/CCST.2006.313458","url":null,"abstract":"The current intrusion detection systems (IDS) which attempt to identify suspicious network traffic have major limitations. The high percentage of alerts generated by such systems, the level of false positives is one of the major problems. We present intelligent strategies for reduction of false positives and infrastructure protection using a novel approach using adaptive responses from multiple firewalls and VPNs (virtual private networks) rule sets in a novel \"network quarantine channels\" (NQC), using firewall architectures. The focus of this paper is on firewall rule sets which operate within the NQC to respond to suspicious hosts and then deny access to critical segments of the network infrastructure. The firewall rule sets provide effective intelligent responses by granting access to the normal packets and denying malicious traffic access to the network, after the identity of the connections are verified through the statistical analysis in the NQC. These effective strategies reduce false positives and increases detection capability of the IDS","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"2023 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127606039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}