Dan Michael A. Cortez, Ariel M. Sison, Ruji P. Medina
{"title":"Cryptographic Randomness Test of the Modified Hashing Function of SHA256 to Address Length Extension Attack","authors":"Dan Michael A. Cortez, Ariel M. Sison, Ruji P. Medina","doi":"10.1145/3390525.3390540","DOIUrl":"https://doi.org/10.1145/3390525.3390540","url":null,"abstract":"Length Extension attack is vulnerable to SHA256. It is a type of attack where certain types of hashes are misused as message authentication codes and allowing for inclusion of extra information. In this study, the researchers introduced an improved padding scheme and hashing process for SHA256 to address this problem. To prove that the modified hash function is cryptographically secure, statistical tests using Strict Avalanche Effect, Frequency Test (Monobit), Frequency Test within a Block, and Run Test were performed to evaluate the results of the Message Digest. Test results show that the number of ones and zeros in each element is distributed uniformly random in the final hash value. Additionally, runtime execution is much faster in generating the hash code since it has reduced the number of rounds to 32.","PeriodicalId":201179,"journal":{"name":"Proceedings of the 2020 8th International Conference on Communications and Broadband Networking","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129013917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quasi Analysis of Rainfall Prediction during Floods using Machine Learning","authors":"K. Bhargavi, G. Suma","doi":"10.1145/3390525.3390535","DOIUrl":"https://doi.org/10.1145/3390525.3390535","url":null,"abstract":"Floods are the most common natural disasters and researchers turned their spotlight on prediction of rainfall for rescuing lives of the people before or after its arrival. The intensity of flood majorly relies on heavy rainfall. If the rainfall is predicted well in advance it will be useful for taking precautionary measures. In this paper, predictive analysis is carried out using both classification and regression models. The prediction analysis is evaluated with the feature rain Tomorrow feature in the dataset. The computation analysis shows that prediction using Random Forest classifier and nth Polynomial regression gives exactness for assessment.","PeriodicalId":201179,"journal":{"name":"Proceedings of the 2020 8th International Conference on Communications and Broadband Networking","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132386056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of TCP Congestion Control in Data Center Networks Based on Stable Round Trip Time","authors":"Yi-Cheng Tsai, T. Hou, M. Chiu","doi":"10.1145/3390525.3390528","DOIUrl":"https://doi.org/10.1145/3390525.3390528","url":null,"abstract":"Data center networks have become increasingly important over the years as they are what make cloud computing, mobile computing, machine learning, and artificial intelligence possible. TCP is the main transport layer protocol in the Internet. Its congestion control has evolved for decades, with many versions or variants having been proposed and improved. Among them, several well-known TCP versions have been implemented either in different versions of the OS kernel or in the data center. Whether it is based on packet loss, round-trip-time (RTT), or bandwidth-delay product (BDP), each has its own advantages and disadvantages. In this paper, we will review the characteristics of the data center, and then propose a TCP version that is more suitable for the data center and achieves reliable transmission with high throughput and low latency.","PeriodicalId":201179,"journal":{"name":"Proceedings of the 2020 8th International Conference on Communications and Broadband Networking","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130799966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wan Nur Aaisyah Binti Wan Mansor, Azuan Ahmad, Wan Shafiuddin Zainudin, M. Saudi, M. Kama
{"title":"Crytojacking Classification based on Machine Learning Algorithm","authors":"Wan Nur Aaisyah Binti Wan Mansor, Azuan Ahmad, Wan Shafiuddin Zainudin, M. Saudi, M. Kama","doi":"10.1145/3390525.3390537","DOIUrl":"https://doi.org/10.1145/3390525.3390537","url":null,"abstract":"The rise of cryptocurrency has resulted in a number of concerns. A new threat known as cryptojacking\" has entered the picture where cryptojacking malware is the trend for future cyber criminals, who infect computers, install cryptocurrency miners, and use stolen information from victim databases to set up wallets for illicit funds transfers. Worst by 2020, researchers estimate there will be 30 billion of IoT devices in the world. Majority of the devices are highly vulnerable to simple attacks based on weak passwords and unpatched vulnerabilities and poorly monitored. Thus it is the best projection that IoT become a perfect target for cryptojacking malwares. There are lacks of study that provide in depth analysis on cryptojacking malware especially in the classification model. As IoT devices requires small processing capability, a lightweight model are required for the cryptojacking malware detection algorithm to maintain its accuracy without sacrificing the performance of other process. As a solution, we propose a new lightweight cryptojacking classifier model based on instruction simplification and machine learning technique that can detect the cryptojacking classification algorithm. This research aims to study the features of existing cryptojacking classification algorithm, to enhanced existing algorithm and to evaluate the enhanced algorithm for cryptojacking malware classification. The output of this research will be significant used in detecting cryptojacking malware attacks that benefits multiple industries including cyber security contractors, oil and gas, water, power and energy industries which align with the National Cyber Security Policy (NCSP) which address the risks to the Critical National Information Infrastructure (CNII).","PeriodicalId":201179,"journal":{"name":"Proceedings of the 2020 8th International Conference on Communications and Broadband Networking","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133346316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MOOCs","authors":"M. Mahmud, Shiau Foong Wong, M. S. A. Bakar","doi":"10.4135/9781483381503.n783","DOIUrl":"https://doi.org/10.4135/9781483381503.n783","url":null,"abstract":"Comparison of cMOOCs and xMOOCs. http://moocnewsandreviews.com/ultimate-guide-to-xmoocs-and-cmoocso/ http://www.mooc.es MiriadaX: plataforma en español de MiriadaX, impulsada por Telefónica y Universia (quien integra a 1.232 universidades de 23 países de Iberoamérica). http://miriadax.net/home Cursos Online Masivos y Abiertos, de la UNED: https://unedcoma.es Compare EdX and OpenMooc (both FLOSS) http://openmooc.org/2013/06/13/edx-source-code-released-and-compared-to-openmooc/","PeriodicalId":201179,"journal":{"name":"Proceedings of the 2020 8th International Conference on Communications and Broadband Networking","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116194689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data-Aided Color Shift Keying Transmission for LCD-to-Smartphone Optical Camera Communication Links","authors":"A. Pepe, S. Kumar, Zixian Wei, Hongyan Fu","doi":"10.1145/3390525.3390534","DOIUrl":"https://doi.org/10.1145/3390525.3390534","url":null,"abstract":"We propose and experimentally validate a data-aided optical camera communication link between commercially available liquid crystals display (LCD) transmitter and smartphone rear camera receiver. The wireless link has been tested on 4, 8 and 16-color shift keying (CSK) modulated signals and paired with an offline artificial neural network-based classification strategy to overcome distortions and disparities in the color representation. For a low luminosity transmitter of 250 cd/m2 and a 12-megapixels camera with 60 fps capture rate placed at 50 cm away were reached 1.95 kbps at 100% symbol classification accuracy, 2.93 kbps at 96.4% and 4.86 kbps at 93.8% for 4, 8 and 16-CSK, respectively.","PeriodicalId":201179,"journal":{"name":"Proceedings of the 2020 8th International Conference on Communications and Broadband Networking","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125006783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Quick Available-Bandwidth Measurement Method Based on Link Delay Growth Rate","authors":"Junzheng Shi, Qingya Yang, Gaopeng Gou, G. Xiong","doi":"10.1145/3390525.3390531","DOIUrl":"https://doi.org/10.1145/3390525.3390531","url":null,"abstract":"Available bandwidth(ABW) has become a key indicator of network measurement, in order to measuring measurement accuracy, in particular, the measurement speed with available bandwidth measurement is also very important. This paper proposes a quick available bandwidth method named QuickAbw, which obtains the available bandwidth quickly under the two link delay growth rates. The link delay growth rate is the rate of growth in the interval between probe packets over time when low-intrusion probe packets with equal intervals just cause link congestion. It is worth mentioning that the probe packets stop sending immediately after causing the link node to overflow, so this method has little impact on the link. Simulations show that QuickAbw has higher measurement accuracy and shorter measurement time than other well-known available bandwidth tools for comparison in a network with single bottleneck-link. Finally, we tested in a real environment consistent with the simulation environment settings, and the experimental results were basically consistent with the simulation results.","PeriodicalId":201179,"journal":{"name":"Proceedings of the 2020 8th International Conference on Communications and Broadband Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129280628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 2020 8th International Conference on Communications and Broadband Networking","authors":"","doi":"10.1145/3390525","DOIUrl":"https://doi.org/10.1145/3390525","url":null,"abstract":"","PeriodicalId":201179,"journal":{"name":"Proceedings of the 2020 8th International Conference on Communications and Broadband Networking","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116609148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}