R. Sánchez-Reillo, Ramón Blanco-Gonzalo, J. Liu-Jimenez, Mariano López, E. Cantó
{"title":"Universal access through biometrics in mobile scenarios","authors":"R. Sánchez-Reillo, Ramón Blanco-Gonzalo, J. Liu-Jimenez, Mariano López, E. Cantó","doi":"10.1109/CCST.2013.6922051","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922051","url":null,"abstract":"The main aim of this paper is the development of a new technology for biometric recognition that allows safe and secure access to universal services such as credit card payment, ATMs, access control, border control, etc. The technology being developed is very generic and easily adaptable to the specific particularities of disabled people; a collective that represents an important proportion of current population (e.g. about the 9% of the total Spanish population).","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127583112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of encryption algorithms on mobile devices","authors":"Alber O. Montoya B, Mario A. Munoz G, S. Kofuji","doi":"10.1109/CCST.2013.6922058","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922058","url":null,"abstract":"Currently communications through mobile devices are necessary, but use of these is restricted due to the presence of attacks on communications. The encrypted authentication and data encryption are techniques to protect against such threats. Among the different types of encryption algorithms that exist, some are unsafe and additionally may require high computational costs, this also causes the communications not to be carried out at the appropriate times and sometimes the session establishing process fails. This paper shows a strategy that allows an analysis of the most common and safe encryption algorithms, specifically Rijndael (Advanced Encryption Standard-AES), SERPENT and TWOFISH, in order to establish which one of these is the most optimum to be implemented in smartphones and tablets; additionally other algorithms are relate, which are used commonly in many applications, tests are carried out over mobiles devices, which measure the performance and computational cost of the devices when they run each algorithm.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126412659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A preliminary application of mobile agents to intrusion detection","authors":"S. Gutiérrez, J. Branch","doi":"10.1109/CCST.2013.6922045","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922045","url":null,"abstract":"This work presents an application of mobile agents to the topic of intrusion detection. The presented solution implements a distributed system based on agents with the capability of mobility, in such a way that when an abnormal event is detected, the agent located at the host where detection was performed moves across the network modifying the firewall rules of the involved hosts to implement a kind of prevention of the probably on going attack.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130923588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine learning techniques applied to intruder detection in networks","authors":"J. L. Henao R, J. E. Espinosa O","doi":"10.1109/ccst.2013.6922081","DOIUrl":"https://doi.org/10.1109/ccst.2013.6922081","url":null,"abstract":"The intrusion in data networks, are a constant problem faced by networks administrators. Because of this, it is necessary identify, study and propose techniques to detect the moment in which the network is attacked, with the purpose of take measures to mitigate these threats. In this paper was conducted a study of the threats taxonomy that could lead to an attack in a data network. For this, we have identified the most relevant characteristics of the network traffic in order to be processed and classified using machine learning techniques, specifically the normalization (Z-Score), dimensionality reduction (PCA) and classification based on artificial neural networks (ANN) to suggest an intrusion detection system (IDS).","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131606880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}