{"title":"A framework for assuring the conformance of cloud-based email","authors":"Melanie Willett, R. V. Solms","doi":"10.1109/ICITST.2013.6750184","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750184","url":null,"abstract":"Cloud-based email, like various other cloud computing solutions, is associated with significant potential benefits for higher education institutions. There are, however, concerns regarding matters such as ensuring compliance and appropriate governance that can affect the level of trust that institutions have regarding the use of such services. This paper describes a framework for assuring the conformance of cloud-based email (FACCE). This framework is intended to assist higher education institutions in South Africa in addressing these problems.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133938326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Counter botnet activities in the Netherlands a study on organisation and effectiveness","authors":"Timo Schless, H. Vranken","doi":"10.1109/ICITST.2013.6750238","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750238","url":null,"abstract":"Botnets are networks of compromised computers used to carry out malicious activities in a coordinated way under control of a botmaster. Botnets are a major threat on the internet and there is general agreement on the necessity of botnet countermeasures. We studied how counter botnet activities are organised in the Netherlands. Through literature study and an empirical study we analysed organisations involved in counteracting botnets, and their capabilities and legal usage thereof. Our findings are that no single organisation is solely capable or has the authority to effectively oppose botnets, and therefore organisations cooperate in structural and ad hoc ways. Relatively simple botnets can be countered effectively, but capabilities and legal authority to disrupt more complex or foreign botnets are missing.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125203496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dalia Battikh, S. E. Assad, B. Bakhache, O. Déforges, Mohamad Khalil
{"title":"Enhancement of two spatial steganography algorithms by using a chaotic system: Comparative analysis","authors":"Dalia Battikh, S. E. Assad, B. Bakhache, O. Déforges, Mohamad Khalil","doi":"10.1109/ICITST.2013.6750155","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750155","url":null,"abstract":"In this paper we propose a chaos-based enhancement of two spatial steganographic algorithms the AE-LSB and the EA-LSBMR and we study their performances. The first algorithm is an adaptive LSB (Least Significant Bit) steganographic method using pixel value differencing that provides a large embedding capacity and imperceptible stego images. The second method is an edge adaptive scheme which can select the embedding region according to the size of secret message and the difference between two adjacent pixels in the cover image. The two methods suffer from low security against attacks to recover secret data. To overcome this weakness, we propose an enhancement of the message security of these methods. The enhancement consists by using an efficient chaotic system to choose in a pseudo-chaotic manner, the pixels in the cover image where the bits of the secret message will be embedded. In this way, the inserted message becomes secure against message recovery attacks and spread over the whole image in a uniform manner. Experiments show that the security of the algorithms is increased.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127682235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparison of major issues for the development of forensics in cloud computing","authors":"Mustafa Aydin, J. Jacob","doi":"10.1109/ICITST.2013.6750166","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750166","url":null,"abstract":"Cloud computing has become an increasingly important resource in recent years, with the provision of easy to use on demand resources attracting many users. The way the cloud delivers its services brings with it some problem areas such as security, and in particular the ability to look into these problems in digital forensic investigations. In this paper we look at a number of important areas in the area of cloud forensics. We look at the stakeholders, the possible designs which may aid cloud forensics, and the big issues in the area — many being big data issues concerning the recording, storage and acquisition of data. We provide a comparison between how the designs will perform with regard to these issues, and look at how the competing demands of stakeholders on these issues will require a balance in order for the development of cloud forensics.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130297350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysing and attacking the 4-way handshake of IEEE 802.11i standard","authors":"A. Alabdulatif, Xiaoqi Ma, L. Nolle","doi":"10.1109/ICITST.2013.6750227","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750227","url":null,"abstract":"The IEEE 802.11i standard has been designed to enhance security in wireless networks. In the 4-way handshake the supplicant and the authenticator use the pairwise master key (PMK) to derive a fresh pairwise transient key (PTK). The PMK is not used directly for security while assuming the supplicant and authenticator have the same PMK before running 4-way handshake. In this paper, the 4-way handshake phase has been analysed using Isabelle tool to identify a new Denial-of-Service (DoS) attack. The attack prevents the authenticator from receiving message 4 after the supplicant sends it out. This attack forces the authenticator to re-send the message 3 until time out and subsequently to de-authenticate supplicant. This paper has proposed improvements to the 4-way handshake to avoid the Denial-of-Service attack.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122883026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A mutual authentication protocol for low-cost RFID tags formally verified using CasperFDR and AVISPA","authors":"Sarah Abughazalah, K. Markantonakis, K. Mayes","doi":"10.1109/ICITST.2013.6750160","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750160","url":null,"abstract":"Although Radio Frequency IDentification (RFID) systems offer many remarkable characteristics, security and privacy concerns are not easy to address. In this paper, we aim to overcome some of the significant privacy and security concerns by proposing a simple and lightweight RFID mutual authentication protocol. Our protocol is utilising hash functions and simple bitwise operations in an attempt to extract the strengths found in previous protocols and avoid their deficiencies. We found that the majority of the proposed protocols fail to resist DoS attacks when the attacker blocks the messages exchanged between the reader and tag more than once. Moreover, recent research focused on the security side and ignored performance. Our proposed protocol aims to solve these issues. We provide an informal analysis along with automated formal analysis using CasperFDR and AVISPA. The results show that the proposed protocol guarantees secret data secrecy and authentication under the presence of a passive adversary.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117092767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sentiment analysis of arabic social media content: a comparative study","authors":"R. Khasawneh, H. Wahsheh, M. Al-Kabi, I. Alsmadi","doi":"10.1109/ICITST.2013.6750171","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750171","url":null,"abstract":"The Internet became an indispensable part of people's lives because of the significant role it plays in the ways individuals interact, communicate and collaborate with each other. Over recent years, social media sites succeed in attracting a large portion of online users where they become not only content readers but also content generators and publishers. Social media users generate daily a huge volume of comments and reviews related to different aspects of life including: political, scientific and social subjects. In general, sentiment analysis refers to the task of identifying positive and negative opinions, emotions and evaluations related to an article, news, products, services, etc. Arabic sentiment analysis is conducted in this study using a small dataset consisting of 1,000 Arabic reviews and comments collected from Facebook and Twitter social network websites. The collected dataset is used in order to conduct a comparison between two free online sentiment analysis tools: SocialMention and SentiStrength that support Arabic language. The results which based on based on the two of classifiers (Decision tree (J48) and SVM) showed that the SentiStrength is better than SocialMention tool.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117127582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A prosodic Text-to-Speech system for Yorùbá language","authors":"A. Akinwonmi, B. K. Alese","doi":"10.1109/ICITST.2013.6750279","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750279","url":null,"abstract":"We reviewed prosody realization in Text-to-Speech (TTS) applications. Standard Yoruba (SY) was considered alongside. Our review showed that the language is under-researched in the area of prosody and speech synthesis generally. Some technologies that produced good prosody in certain syllable based languages were identified. These include the use of polysyllabic units, diphones and Hidden Markov's Model (HMM). We recommended a fusion of these technologies to realize the Yoruba TTS of high prosody. A mean opinion score (MOS) is also proposed to ascertain naturalness of the proposed TTS. This report presents among others, the review of prosody techniques in TTS, challenges of a Yoruba TTS and the proposed solution.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115506730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A privacy-aware query authentication index for encrypted database in cloud","authors":"Miyoung Jang, Ara Jo, Jae-Woo Chang","doi":"10.1109/ICITST.2013.6750176","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750176","url":null,"abstract":"Cloud computing has been spotlighted as a new paradigm of database management system. However, cloud service provider might be untrusted so that two issues of data security, including data confidentiality and query result integrity, become major concerns for users. Existing bucket-based data authentication methods have problems of data disclosure and transmission overhead, due to the unsophisticated data grouping strategy. In this paper, we propose a privacy-aware query authentication index which guarantees data confidentiality and query result integrity for users. We privately partition a spatial database into small groups by using periodic function and generate a signature of each group. The group signature is used to check the correctness and completeness of outsourced data when answering a range query to users. Through performance evaluation, it is shown that proposed method outperforms the existing method in terms of range query processing time up to 3 times.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115399744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feasibility analysis of transportation applications based on APIs of social network services","authors":"Young-Ji Byon, Y. Jeong, S. Easa, J. Baek","doi":"10.1109/ICITST.2013.6750162","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750162","url":null,"abstract":"With increasing ownership of smartphones and membership of various social network services (SNS), new types of Advanced Traveler Information Systems (ATIS) has become available to travelers. The smartphone enables mobile users to input and access real-time information while SNSs provide voluntarily collected personal information among networks of friends. Internet of Things (IoT) philosophy can be applied for connecting smartphone users for various transportation applications. This paper develops Facebook-based carpooling, and proposes Twitter-based traffic monitoring and Flickr-based incident reporting applications. The SNS services provide application programming interfaces (APIs) that allow external users to access their databases. The APIs provide a basis for the development of transportation applications for each service. Facebook can allow a group of friends to share a ride based on their attributes which are available in their personal information sections. Twitter can be used for sharing traffic conditions on the roads. Flickr can be customized as a geo-tagged collision reporting tool with real-time close-up photos of traffic collisions. It is found that available APIs are useful for implementing SNS-based transportation applications. It is also found that search times for carpooling partners vary with multiple factors: time-of-day, number of potential partners, and desired tolerance levels for location and time.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"48 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130660015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}