{"title":"Accurate ICMP TraceBack Model under DoS/DDoS Attack","authors":"A. Izaddoost, M. Othman, M. Rasid","doi":"10.1109/ADCOM.2007.28","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.28","url":null,"abstract":"One of the most significant current groups of security endangerments in the Internet is DoS/DDoS attacks. The goal of these kinds of attacks is to completely engage available resources so that legitimate users are not able to access a service. Some traceback approach has been proposed to traceback source of attack. One of these methods is Intention-driven iTrace which is the working base of the ICMP traceback. By this method, it will be possible to increase effective ICMP traceback messages which can provide useful information to the victim in tracing source of attack. Reconstructed path to the source of attack by the victim can be done accurately when more effective ICMP traceback messages are generated in critical routers. In this paper, we proposed a model considering incoming packets routed to the victim and by modifying intention-driven iTrace model, we can generate more effective ICMP traceback packets to locate the source of attack more accurately.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115853920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Mukherjee, A. Chakravorty, Kuntal Ghosh, M. Roy, A. Adhikari, S. Mazumdar
{"title":"Corroborating the Subjective Classification of Ultrasound Images of Normal and Fatty Human Livers by the Radiologist through Texture Analysis and SOM","authors":"S. Mukherjee, A. Chakravorty, Kuntal Ghosh, M. Roy, A. Adhikari, S. Mazumdar","doi":"10.1109/ADCOM.2007.59","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.59","url":null,"abstract":"The objective of this study is to establish that subjective evaluation of fatty as well as normal ultrasound human liver images based on echotexture (spatial pattern of echoes) and echogenicity by visual inspection can be corroborated by Haralick's statistical texture analysis. Seventy-six ultrasound scan images of human normal livers and twenty-four ultrasound images of fatty livers as identified by the radiologist on the basis of echotexture and echogenecity, have been collected from hospital for this study. An unsupervised neural network learning technique, namely, Self Organising Map (SOM) has been employed to generate profile plots. Using Student's t like statistic for each feature as a measure of distinction between normal and fatty livers, two most appropriate features, namely, maximum probability (Maxp) and uniformity (Uni) are selected from this profile plots. These two features are found to form clusters with little overlap for normal and fatty livers. Thus statistical texture analysis of the ultrasound human images using 'Maxp\" and \"Uni\" presented the best results for corroborating the classification as made the radiologist by visual inspection. This work may be a humble beginning to model the radiologists' perceptual findings that may emerge in future as a new tool with respect to 'ultrasonic biopsy'.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115963455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying Aspect-Oriented Approach for Instance Adaptation for Object-Oriented Databases","authors":"S. Kuppuswami, K. Palanivel, V. Amouda","doi":"10.1109/ADCOM.2007.46","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.46","url":null,"abstract":"Developing object-oriented database for web applications may not remain constant and may vary to a large extent due to a variety of reasons like correcting mistakes, adding new features or any changes in the structure of the real world artifacts modeled in the database. Class versioning is one of the evolution strategy employed that addressing the above issues. The existing strategy for instance adaptation introduces the adaptation code directly into the class versions upon evolution. Consequently, if the behavior of a routine needs to be changed and maintenance has to be performed on all the class versions it was introduced. A new approach for instance adaptation is achieved by encapsulating the instance adaptation code through aspects - abstractions introduced by aspect-oriented programming that localize cross-cutting concerns. A web-based student database system was developed with different versions and the versioning problem was solved using update/backdate aspects with selective lazy conversion. The update/backdate aspects are invoked whenever version incompatibility arises and selective lazy conversion aspect is invoked when the condition for converting objects into new version is satisfied and this converts only a subset of the old version objects into new version.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128430740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Santosh K. Ghosh, Monjur Alam, Kundan Kumar, Debdeep Mukhopadhyay, D. R. Chowdhury
{"title":"Preventing the Side-Channel Leakage of Masked AES S-Box","authors":"Santosh K. Ghosh, Monjur Alam, Kundan Kumar, Debdeep Mukhopadhyay, D. R. Chowdhury","doi":"10.1109/ADCOM.2007.103","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.103","url":null,"abstract":"Masking of gates is one of the most popular techniques to prevent Differential Power Analysis (DPA) of AES S- Boxes. However due to the presence of glitches in circuits even masked circuits leak side-channel information. Moti- vated by this fact, we proposed a balanced masked multi- plier where the inputs are synchronized either by sequential components or controlled AND logic, that can be a possible solution for preventing DPA attack on masked implementa- tion of AES S-Boxes. Detailed SPICE results are shown to support the claim that the modifications indeed reduce the vulnerability of the masked multiplier against DPA attacks. Keywords: Side Channel Attacks, Masked Multiplier, AES S-box, Differential Power Analysis","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125420730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Engineering an Autonomic Container for WSRF-Based Web Services","authors":"C. Reich, M. Banholzer, R. Buyya, K. Bubendorfer","doi":"10.1109/ADCOM.2007.65","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.65","url":null,"abstract":"This paper presents an autonomic Web service resource framework (WSRF) container that enables self- configuration using IBM's autonomic computing (AC) architecture and resolves quality of service (QoS) problems through service migration. The migration manager bases its decisions on an overall health status metric (H-metric). The H-metric characterises the health of a service container. A unified AC sensor/effector interface, protocol, and metric summarization allows us to build up a hierarchical WSRF container structure to create a virtualized WSRF container.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125914216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Test Case Generation from UML Sequence Diagram","authors":"M. Sarma, Debasish Kundu, Rajib Mall","doi":"10.1109/ADCOM.2007.49","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.49","url":null,"abstract":"This paper presents a novel approach of generating test cases from UML design diagrams. Our approach consists of transforming a UML sequence diagram into a graph called the sequence diagram graph (SDG) and augmenting the SDG nodes with different information necessary to compose test vectors. These information are mined from use case templates, class diagrams and data dictionary. The SDG is then traversed to generate test cases. The test cases thus generated are suitable for system testing and to detect interaction and scenario faults.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124561230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Energy Aware Routing Protocol for Mobile Ad-Hoc Networks","authors":"A. Chattopadhyay, M. Thomas, A. Gupta","doi":"10.1109/ADCOM.2007.41","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.41","url":null,"abstract":"In this paper we propose a new energy aware routing protocol for mobile ad-hoc networks. Nodes in a mobile ad-hoc network operate on batteries, and hence designing energy aware protocols to maximize the battery lifetime is important. Traditional routing protocols fail to address the energy issues present in these networks. Several energy aware routing protocols have been designed in the recent years for mobile ad-hoc networks. We present a new protocol named KHOP that is based on ideas in two well-known existing protocols. Detailed simulation results are presented to show that the new protocol works better than both the existing protocols for a large number of scenarios.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133740456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Generalized Reconfigurable Architecture for Digital Signal Processor","authors":"J. Basu, Md. Sahidullah, A. Sinha","doi":"10.1109/ADCOM.2007.21","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.21","url":null,"abstract":"In this paper a novel re-configurable digital signal processing (DSP) architecture and algorithm has been proposed where basic building blocks are high performance adders, subtracters, multipliers etc. The architecture has been conceived keeping high performance, low dynamic configuration latency, flexibility and low power consumption in view. Issues involving interconnection among the basic building blocks have been dealt with in details and a new scheme is proposed.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130967957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust Aware Rouitng with Load Balancing in Ad Hoc Network Using Mobile Agent","authors":"N. Nehra, R. B. Patel, V. K. Bhat","doi":"10.1109/ADCOM.2007.125","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.125","url":null,"abstract":"In mobile ad hoc networks (MANETs), a source node must rely on other nodes to forward its packets on multi-hop routes to the destination. Secure and reliable handling of packets by the intermediate nodes is difficult to ensure in an ad hoc network. This is particularly challenging when malicious nodes collude with one another to disrupt the network operation. So we propose a trust establishment scheme for MANETs which aims to improve the reliability of packet forwarding over multi-hop routes in the presence of potentially malicious nodes using mobile agent (MA). We evaluate two key metric for trust establishment namely trust and confidence which are used by corresponding MA for route discovery and topology maintenance. We have extended the solution to secure the network against colluding malicious nodes. Proposed scheme is evaluated using PMADE (platform for mobile agent distribution and execution) along with Glomosim. Simulation results shows that proposed scheme is quite effective for trust establishment in ad hoc networks.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132614555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hop-by-Hop versus End-to-End Congestion Control in Wireless Multi-Hop UWB Networks","authors":"P. Reena, L. Jacob","doi":"10.1109/ADCOM.2007.78","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.78","url":null,"abstract":"We perform a comparative study of the performance of hop-by-hop and end-to-end congestion control mechanisms for wireless multi hop network. We consider the effect of using different utility functions and study their effect on throughput and peak queue size. The multiple access communication is assumed to be ultra-wide bandwidth (UWB) time-hopping spread-spectrum (TH-SS) impulse radio. The joint congestion and power control is formulated as an optimization problem which is then solved by distributed iterative algorithms for flow rate adaptation and power adaptation. Significant reduction in the buffer size requirement can be achieved by using hop- by-hop approach, under high propagation delays. Use of power control reduces the buffer size requirement, in addition to providing improvement in energy efficiency.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114258891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}