{"title":"ISEA-ISAP 2020 Cover Page","authors":"","doi":"10.1109/isea-isap49340.2020.9079323","DOIUrl":"https://doi.org/10.1109/isea-isap49340.2020.9079323","url":null,"abstract":"","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126487226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meghali Nandi, R. Bhattacharjee, Amrit Kumar Jha, F. Barbhuiya
{"title":"A secured land registration framework on Blockchain","authors":"Meghali Nandi, R. Bhattacharjee, Amrit Kumar Jha, F. Barbhuiya","doi":"10.1109/ISEA-ISAP49340.2020.235011","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP49340.2020.235011","url":null,"abstract":"Land is an immovable and non-liquid asset having high value. The integrity and proper track of ownership/transfer records of land is a highly challenging task. As the ownership of land can constantly change over time and that too sometimes very frequently, it poses a daunting task of keeping elaborate and long ownership transfer records. The problem further escalates due to presence of fraudulent or incomplete registries which are very difficult to trace back through time. Thus ownership disputes in the system, lead to litigation running for years, leading to wastage of valuable time, energy and resource for solving these disputes. Most of the issues root from the problem of the current land registration systems being either having legacy paper document trails or from poorly kept non-transparent centralized systems. Fraudulent users may try to forge paper documents or modify electronic records to change the land ownership record. This paper proposes a secure record keeping mechanism that addresses these issues using a Blockchain based system which can create record for the physical assets into an immutable liquid Blockchain based token asset. This new block chain token asset can now be used to keep a digitally secured and selectively visible record of ownership, solving the mentioned issues. An implementation of this system has been done using Ethereum and the benchmark data shows that the transaction processing time of such a system is reasonably low thereby making it suitable for practical implementation.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127619173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thockchom Birjit Singha, R. P. Palathinkal, S. Ahamed
{"title":"Implementation of AES Using Composite Field Arithmetic for IoT Applications","authors":"Thockchom Birjit Singha, R. P. Palathinkal, S. Ahamed","doi":"10.1109/ISEA-ISAP49340.2020.235009","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP49340.2020.235009","url":null,"abstract":"The presented work carries out a Very Large Scale Integration (VLSI) implementation of the Advanced Encryption Standard (AES) symmetric cipher to investigate for its best-suited architecture for IoT applications. Standard architectures, such as, rolling, unrolling and combinational were examined. S-box, which forms the core of AES was designed using composite field arithmetic and an optimized form was used in each architecture design to improve hardware efficiency. The design, verification and RTL synthesis of the algorithm was done using Xilinx Vivado 2018.3 simulator. Stringent area and power requirements being the prior criteria for IoT devices, the rolled architecture turned out to be the favorite candidate upon analysis of the result.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122627722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of DDoS Attack and Classification Using a Hybrid Approach","authors":"Suman Nandi, S. Phadikar, K. Majumder","doi":"10.1109/ISEA-ISAP49340.2020.234999","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP49340.2020.234999","url":null,"abstract":"In the area of cloud security, detection of DDoS attack is a challenging task such that legitimate users use the cloud resources properly. So in this paper, detection and classification of the attacking packets and normal packets are done by using various machine learning classifiers. We have selected the most relevant features from NSL KDD dataset using five (Information gain, gain ratio, chi-squared, ReliefF, and symmetrical uncertainty) commonly used feature selection methods. Now from the entire selected feature set, the most important features are selected by applying our hybrid feature selection method. Since all the anomalous instances of the dataset do not belong to DDoS category so we have separated only the DDoS packets from the dataset using the selected features. Finally, the dataset has been prepared and named as KDD DDoS dataset by considering the selected DDoS packets and normal packets. This KDD DDoS dataset has been discretized using discretize tool in weka for getting better performance. Finally, this discretize dataset has been applied on some commonly used (Naive Bayes, Bayes Net, Decision Table, J48 and Random Forest) classifiers for determining the detection rate of the classifiers. 10 fold cross validation has been used here for measuring the robustness of the system. To measure the efficiency of our hybrid feature selection method, we have also applied the same set of classifiers on the NSL KDD dataset, where it gives the best anomaly detection rate of 99.72% and average detection rate 98.47% similarly, we have applied the same set of classifiers on NSL DDoS dataset and obtain the average DDoS detection of 99.01% and the best DDoS detection rate of 99.86%. In order to compare the performance of our proposed hybrid method, we have also applied the existing feature selection methods and measured the detection rate using the same set of classifiers. Finally, we have seen that our hybrid approach for detecting the DDoS attack gives the best detection rate compared to some existing methods.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130744036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ISEA-ISAP 2020 Author Index","authors":"","doi":"10.1109/isea-isap49340.2020.9079288","DOIUrl":"https://doi.org/10.1109/isea-isap49340.2020.9079288","url":null,"abstract":"","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115702780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigating Elliptic Curve Cryptography for Securing Smart Grid Environments","authors":"D. K., K. Chandrasekaran","doi":"10.1109/ISEA-ISAP49340.2020.234993","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP49340.2020.234993","url":null,"abstract":"This paper evaluates the performance of an elliptic curve based approach for the task of data aggregation in smart grids. This scheme supports a distributed data aggregation approach, where smart meters at each level of the tree aggregate results from their children and transmit it to their parents. We use homomorphic encryption to ensure the privacy of encrypted power usage data during its transmission among the smart meters. Power usage statistics are aggregated at each level of the network tree, and a smart meter shall not gain any information on the encrypted data received by it. We discuss some advantages of using elliptic curves to ensure additive homomorphism, and justify some of its shortcomings and performance issues. We also consider possible improvements that allows the proposed system to perform well in the environment of smart grid system. Finally, we compare the proposed scheme to the Paillier cryptosystem using the Mosaik smart grid simulation framework.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116379488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Traffic Monitoring and Policy Enforcement Framework for HTTP","authors":"M. N, Anna Thomas, Indu S, B. Bindhumadhava","doi":"10.1109/ISEA-ISAP49340.2020.235004","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP49340.2020.235004","url":null,"abstract":"Due to the accessibility and popularity of Internet, web based applications are commonly used for providing different services to the users. At the same time, the simplicity to conduct attacks and the availability of several attack tools have made web applications the most common target for attackers. Hence monitoring and analysis of web applications require special attention. In this paper, we describe a policy enforcement and web attack detection framework for HTTP protocol. The proposed framework can monitor and analyze HTTP traffic to detect injection, misconfiguration and directory traversal attacks. Moreover, this framework can be used to enforce web application access policies involving content type, URL and device level access.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125743474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}