{"title":"Authenticated key agreement and cluster head selection for Wireless Body Area Networks","authors":"Jawaid Iqbal, Nizamuddin, N. Amin, A. I. Umar","doi":"10.1109/NCIA.2013.6725334","DOIUrl":"https://doi.org/10.1109/NCIA.2013.6725334","url":null,"abstract":"Wireless Body Area Network (WBAN) has become imperative due to rapid advancement in medical technology. However, WBAN faces different security issues due to open air communication of information. In this paper, we have proposed a lightweight smart crypto solution using authenticated key exchange coupled with cluster head formation and selection for the security of WBAN. Our proposed solution logically combines cluster head selection with key agreement that fulfills the security requirement of wireless body area network, efficient in term of resource utilization.","PeriodicalId":222016,"journal":{"name":"2013 2nd National Conference on Information Assurance (NCIA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127066815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Primary User Emulation attack and their mitigation strategies: A survey","authors":"Bilal Naqvi, Imran Rashid, F. Riaz, B. Aslam","doi":"10.1109/NCIA.2013.6725331","DOIUrl":"https://doi.org/10.1109/NCIA.2013.6725331","url":null,"abstract":"Cognitive Radio emerged as a solution to solve the spectrum scarcity by allowing unlicensed user to exist with the licensed users of the network whenever the licensed users are in idle state. Cognitive radio since its inception has received a lot of importance as far as research is concerned, however security threats also emerged with this promising technology among which Primary User Emulation (PUE) attack is one. We cover an understanding of the PUE attack in this paper and then discuss existing solutions to mitigate it along with the limitations of the proposed solutions. In end we identify the need of solution to address a case that has not been addressed yet.","PeriodicalId":222016,"journal":{"name":"2013 2nd National Conference on Information Assurance (NCIA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127968603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital forensics: Latest challenges and response","authors":"Muhammad Sharjeel Zareen, Adeela Waqar, B. Aslam","doi":"10.1109/NCIA.2013.6725320","DOIUrl":"https://doi.org/10.1109/NCIA.2013.6725320","url":null,"abstract":"Twenty first century has witnessed an explosive growth in use of computers and networks in every facet of life. With this explosive growth, new advancements in the field of secure computing, network technologies and systems have also been witnessed at an unprecedented rate. These developments have made existing digital forensics tools and techniques ineffective. Moreover, easy access to science of digital forensics and associated techniques has lead to use of anti-forensics measures by malicious actors to cover their traces. The paper highlights the impact of latest trends, technological advancement and use of anti-forensics measures on digital forensics along with the response of digital forensics to them. Shortfalls in the said response have also been covered along with recommended measures to address them. Moreover, historical perspective and established procedures of digital forensics are also discussed.","PeriodicalId":222016,"journal":{"name":"2013 2nd National Conference on Information Assurance (NCIA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131232615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Analytics: Big Data Analytics for cybersecurity: A review of trends, techniques and tools","authors":"Tariq Mahmood, U. Afzal","doi":"10.1109/NCIA.2013.6725337","DOIUrl":"https://doi.org/10.1109/NCIA.2013.6725337","url":null,"abstract":"The rapid growth of the Internet has brought with it an exponential increase in the type and frequency of cyber attacks. Many well-known cybersecurity solutions are in place to counteract these attacks. However, the generation of Big Data over computer networks is rapidly rendering these traditional solutions obsolete. To cater for this problem, corporate research is now focusing on Security Analytics, i.e., the application of Big Data Analytics techniques to cybersecurity. Analytics can assist network managers particularly in the monitoring and surveillance of real-time network streams and real-time detection of both malicious and suspicious (outlying) patterns. Such a behavior is envisioned to encompass and enhance all traditional security techniques. This paper presents a comprehensive survey on the state of the art of Security Analytics, i.e., its description, technology, trends, and tools. It hence aims to convince the reader of the imminent application of analytics as an unparalleled cybersecurity solution in the near future.","PeriodicalId":222016,"journal":{"name":"2013 2nd National Conference on Information Assurance (NCIA)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127590680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A technique for digital watermarking in combined spatial and transform domains using chaotic maps","authors":"Amir Anees, A. M. Siddiqui","doi":"10.1109/NCIA.2013.6725335","DOIUrl":"https://doi.org/10.1109/NCIA.2013.6725335","url":null,"abstract":"In this paper, the problems of robustness and quantity of embedded watermark of digital watermarking linked with independent spatial and frequency domains have been analysed. In attempt to overcome these problems to some extent, we have proposed a technique for watermarking in combined spatial and frequency domains based upon chaotic maps. By applying chaos effectively in secure communication, the strength (robustness) of overall anticipated algorithm has been increased to a significant level. In addition, few security statistical analyses such as correlation, entropy, energy, contrast, homogeneity, mean square error and peak signal to noise ratio have also been carried out and it is shown through confidence measure that it can survive against unintentional attacks such as addition of noise, compression and cropping.","PeriodicalId":222016,"journal":{"name":"2013 2nd National Conference on Information Assurance (NCIA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122215908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion Detection System in Cloud Computing: Challenges and opportunities","authors":"Y. Mehmood, U. Habiba, M. A. Shibli, Rahat Masood","doi":"10.1109/NCIA.2013.6725325","DOIUrl":"https://doi.org/10.1109/NCIA.2013.6725325","url":null,"abstract":"Today, Cloud Computing is the preferred choice of every IT organization since it provides flexible and pay-per-use based services to its users. However, the security and privacy is a major hurdle in its success because of its open and distributed architecture that is vulnerable to intruders. Intrusion Detection System (IDS) is the most commonly used mechanism to detect attacks on cloud. This paper provides an overview of different intrusions in cloud. Then, we analyze some existing cloud based intrusion detection systems (IDS) with respect to their type, positioning, detection time, detection technique, data source and attacks they can detect. The analysis also provides limitations of each technique to evaluate whether they fulfill the security requirements of cloud computing environment or not. We emphasize the deployment of IDS that uses multiple detection methods to cope with security challenges in cloud.","PeriodicalId":222016,"journal":{"name":"2013 2nd National Conference on Information Assurance (NCIA)","volume":"350 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124322357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Tariq, B. Aslam, Imran Rashid, Adeela Waqar
{"title":"Cyber threats and incident response capability - a case study of Pakistan","authors":"Muhammad Tariq, B. Aslam, Imran Rashid, Adeela Waqar","doi":"10.1109/NCIA.2013.6725319","DOIUrl":"https://doi.org/10.1109/NCIA.2013.6725319","url":null,"abstract":"The tremendous growth of information technology has abruptly changed the world into global village. It has caused the distances to shrink and information to flow across the globe as it occurs. At the same time it has also given boost to vulnerabilities, threats, frauds and criminals in the cyberspace. The ease of access, user friendly hacking tools and sophistication in cyber attacks has infringed the privacy of the individuals, organizations and states. Pakistan is facing multifaceted cyber threats in the present era. The cyber attacks occurred on the government, corporate and private sectors within last couple of years has been analyzed in this paper to identify nature dynamics of threat to Pakistani ICT infrastructure and resources. The study highlights wide range and variety of cyber threats ranging from normal website defacement to sophisticated and persistent cyber threat. Further, existing response capability at government and organizational level is evaluated and the shortcomings have been highlighted. It is feared that non existence of any cyber security laws, void of response mechanism and lack of organizational framework in the country may offer Pakistan cyberspace a heaven for the criminals and malicious operators / users. It is noted that Pakistan government not only requires realization of cyber threats and consequences of its uncontrolled usage but also needs appropriate response mechanism to guard against such threats. A top level organizational structure is proposed in this paper for establishment of essential cyber security bodies at different tiers, responsible for securing cyber space of the country by introducing necessary legislation and formulating the response mechanism at different government tiers.","PeriodicalId":222016,"journal":{"name":"2013 2nd National Conference on Information Assurance (NCIA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117236718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Embedding watermarks in multiple tables in numeric dataset by bit pattern generation sub-watermarks","authors":"Sidra Sultana","doi":"10.1109/NCIA.2013.6725329","DOIUrl":"https://doi.org/10.1109/NCIA.2013.6725329","url":null,"abstract":"A novel and technical approach for watermarking tables of a numeric dataset is proposed. Watermark insertion and detection is done by K Map Minimizer. The crucial aspect of the proposed technique is the permuted bit pattern generation. The bit pattern is generated by first selecting unique rows and columns and solving the four attributes at the selected position through the K Map Minimizer to constitute a pattern. To make the bit pattern more secure permutation is applied before, where the size of the bit pattern is adjusted as per requirement. This unique permuted bit pattern is called the watermarked permuted bit pattern. Each bit of watermarked permuted bit pattern is added /subtracted while sub watermarking the selected attribute. Four secret keys and one permutation key are used which adds to the integrity of the technique. Secret keys are always used in pair so knowledge of a single key to an attacker, is of no use rather access to k-1 keys, where k is the number of keys, is also of not much worth as to generate a watermarked permuted bit pattern all four keys are requirement. Watermark detection routine is blind as it neither requires the original dataset nor the watermarked one. Watermarks are equally distributed in a very large dataset as six digits number is selected through K Map Minimizer, so the watermark can be detected even in a small subset of a watermarked relation as long as the sample contains some of the marks. Proposed technique is robust against various malicious attacks and updates to the data. Dealing with multiple tables adds to the practicality of the data.","PeriodicalId":222016,"journal":{"name":"2013 2nd National Conference on Information Assurance (NCIA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116033883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social networks and web security: Implications on open source intelligence","authors":"Fahad Ansari, M. Akhlaq, A. Rauf","doi":"10.1109/NCIA.2013.6725328","DOIUrl":"https://doi.org/10.1109/NCIA.2013.6725328","url":null,"abstract":"Recent occurrences in the global geopolitical arena shape the ground to the vanguard of swift strategic intelligence gathering through open-source medium, particularly the online social networking media. Various intelligence agencies in the world - are at present - incorporating online social media platforms into function, as a valuable source of information acquisition. However, the integration of the same is yet to be instilled in Pakistan broadly to supplement the overall operations of law enforcement and intelligence agencies. In this paper, recent events that highlighted the intelligence aspect of social media networking have been considered including, Arab Spring, Libyan civil war associated with NATO's operations of 2011 and Israel Air Flotilla. Conjointly, the analysis of the events signify the influential competence of social media network to illustrate trends of the masses and devise political stance, increment tactful intelligence, and contribute to timely yet accurate operations against targeted factions. In addition, the paper is put together on the foundation and significance of security risks associated with social networks comprising of privacy violations and divulgence of confidential and personal data which may be used for malicious activities by spiteful entities or for state sponsored cyber warfare and monitoring on the lines of the cases discussed. Furthermore, recommendations of easy executable practices to assist users to improve privacy on social media networking websites are also proffered.","PeriodicalId":222016,"journal":{"name":"2013 2nd National Conference on Information Assurance (NCIA)","volume":"336 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126440122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SafePass: Authentication under duress for ATM transactions","authors":"S. Hameed, S. A. Hussain, Sohail Hussain Ali","doi":"10.1109/NCIA.2013.6725317","DOIUrl":"https://doi.org/10.1109/NCIA.2013.6725317","url":null,"abstract":"With the proliferation of ATM installations throughout the world, billions of transactions are being conducted annually. This easy, location independent and 24 hours access to money has also given birth to ATM related thefts and this situation is more pronounced in developing countries with poor law and order situation. Panic passwords can be used as an effective mean to signal stress during authentication. Panic password scheme provides a safe way to avoid a forced authentication or signal stress when authentication is a result of coercive action. In this paper, we introduce SafePass, a new panic password scheme that can be easily deployed over the ATM infrastructure. In SafePass, special attention is given from the usability perspective as it would be extremely valuable for large scale proliferation.","PeriodicalId":222016,"journal":{"name":"2013 2nd National Conference on Information Assurance (NCIA)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132079239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}