{"title":"Reinforcing network security by converting massive data flow to continuous connections for IDS","authors":"Maher Salem, Ulrich Bühler","doi":"10.1109/ICITST.2013.6750267","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750267","url":null,"abstract":"Processing massive data flow in intrusion detection systems (IDS) become a serious challenge. It is considered as a major deficiency while handling heterogeneous and non-stationary data stream to uncover anomaly in the online operational mode. This paper proposes a novel online method that constructs connections from the massive data flow for evaluating IDS models. The proposed method overcomes this challenge by using a queuing concept of dynamic window size. It captures network traffic and hosts events constantly and handles them synchronously within time slot windows inside the queue in order to construct connection vectors based on certain features. We have evaluated the method in offline mode using DARPA dump data flow and in online mode using a simulated network at the university campus. In addition, we have evaluated our IDS model using the constructed connections to proof the feasibility and plausibility of the proposed method in IDS area. The performance evaluation confirms that, the proposed method is able to operate in offline as well online modes efficiently. Moreover, constructed connections are very adequate for training and evaluating IDS models.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132740477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Edge detection methods in palm-print identification","authors":"O. Akinsowon, B. K. Alese","doi":"10.1109/ICITST.2013.6750235","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750235","url":null,"abstract":"Biometric recognition, or simply biometrics, refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. By using biometrics it is possible to confirm or establish an individual's identity based on “who she is”, rather than by “what she possesses” (e.g., an ID card) or “what she remembers” (e.g., a password). Today, it is becoming more and more popular to use biometrics to identify people and authenticate them for access to secure areas and systems. Biometric has been getting more and more attention after the September 9/11 episode in America. It is a unique, measurable characteristic or trait of a human being for automatically recognizing or verifying identity. This paper spotlights biometric recognition as a key form of identification, one which is increasingly used in a wide range of applications made possible by advanced pattern recognition algorithms applied through powerful ICT.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133837061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cloud Enabled Social Media Monitoring Platform for Events Detection and Prediction","authors":"E. Benkhelifa, T. Welsh","doi":"10.1109/ICITST.2013.6750179","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750179","url":null,"abstract":"The data mined from social networks has been shown to have an inherent wealth of information. However the heterogeneous nature of this data along with difficulties in predetermining its rate and source makes collecting and aggregating it an often inefficiently run task. This paper presents a platform which leverages some of the architecture and features of Cloud computing in order to dynamically scale resources according to data rate, so as to collect and parse data from a variety of social media sources in an economical manner. The nature of the platform means that it may be applied to a variety of social network monitoring tasks, which may take advantage of the dynamic and economical nature of Cloud-based architectures. This paper addresses a gap in the current literature and proposes a novel Cloud Enabled Social Media Monitoring Platform for Events Detection and Prediction.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131210234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trustworthy evidence gathering mechanism for multilayer cloud compliance","authors":"M. Florian, Sarita Paudel, Markus Tauber","doi":"10.1109/ICITST.2013.6750257","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750257","url":null,"abstract":"Cloud Computing allows the designing of systems which dynamically acquire compute resources. This makes it very suitable for Critical Infrastructures where unpredictable load due to human usage patterns are very likely. Especially in this domain legal compliance is a growing concern in general. Abstraction over multiple architectural cloud layers allows for individual layers being operated by different providers. This makes it hard to determine whether legal compliance is given. In this paper we motivate the research towards an Event Gathering Mechanism which is envisioned to allow the modelling of legal aspects in a multi layered cloud environment.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114942138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud security and compliance concerns: Demystifying stakeholders' roles and responsibilities","authors":"Muteveri Kandira, J. Mtsweni, Keshnee Padayachee","doi":"10.1109/ICITST.2013.6750284","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750284","url":null,"abstract":"Cloud computing is a new computing model that may offer numerous benefits to potential users. The sharing of dynamically scalable resources such as computing, storage, and infrastructure via the internet could enhance an organisation's growth through the reduction of IT costs. However, research has shown that cloud computing has various security and compliance concerns. The ancillary objective of this paper is to identify the security and compliance concerns that organisations are likely to encounter when choosing to adopt and use cloud services. Consequently, the main contribution of this paper is the identification of roles and responsibilities of the stakeholders who are central in addressing these security and compliance concerns in the cloud platform.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121363290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web Service constraint optimization","authors":"Aspen Olmsted, C. Farkas","doi":"10.1109/ICITST.2013.6750204","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750204","url":null,"abstract":"In this paper we investigate the problem of providing consistency, availability and durability for Web Service transactions. We consider enforcement of integrity constraints in a way that increases availability while guaranteeing the correctness specified in the constraint. We study hierarchical constraints that offer an opportunity for optimization because of an expensive aggregation calculation required in the enforcement of the constraint. We propose an approach that guarantees that the constraint cannot be violated and also allow the distribution of write operations among many clusters to increase availability. In our previous work, we proposed a replica update propagation method, called the Buddy System, which guaranteed durability and increased availability of web services. In this paper we extend the Buddy System to enforce hierarchical data integrity constraints.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123136867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A recommendation scheme utilizing Collaborative Filtering","authors":"N. Dzugan, Lance Fannin, S. Makki","doi":"10.1109/ICITST.2013.6750170","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750170","url":null,"abstract":"The proliferation of computers as handheld devices with Internet connectivity along with ecommerce and social networking sites allow the generation of huge amount of data. This data empowers the corporations and other organizations to produce meaningful business patterns from consumers' behavior. Also, they can build recommender systems to predict future social trends which can enhance their services and improve their products. For example, The recommendation systems used by companies such as Amazon, Google News, and Netflix utilize Collaborative Filtering techniques such as k-nearest neighbor (kNN) to discover what their users like and dislike. Using kNN, the system compares a primary user with all others and determines how similar their interests are to the primary user's. Doing so creates a neighborhood list, consisting of every user's similarity to the primary user. Using this list, it is easy to determine the primary user's most similar, or nearest neighbor. This nearest neighbor will then provide the basis for the primary user's recommendations. In this research, we present a realistic method to process large data sets collected from Internet for recommending bookmarks by using kNN in a variation of Collaborative Filtering called One-Class Collaborative Filtering (OCCF).","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133893055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Embedded implementation of Edwards curve- and extended Jacobi quartic curve-based cryptosystems","authors":"C. Peretti, P. Gastaldo, M. Stramezzi, R. Zunino","doi":"10.1109/ICITST.2013.6750229","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750229","url":null,"abstract":"This research addresses the computationally-effective implementation of cryptographic protocols based on elliptic curves, and targets in particular cryptosystems that should be hosted on embedded programmable processors. In principle, the implementation of Elliptic Curve Cryptography (ECC) requires one to deal with different design options, which stem from the available degrees of freedom: elliptic curve family, coordinate system, and point multiplication procedure. On the other hand, theoretical studies already proved that exist only a few setups leading to computational efficient implementations. The goal of present paper is to analyze from an applicative point of view such setups, which mainly involve two specific families of elliptic curves: Edwards curves and extend Jacobi quartic curves. The presented experimental session shows a few interesting outcomes; first, ECC schemes implemented by using either Edwards curves or extended Jacobi quartic curves can obtain remarkable performances in terms of computational efficiency also on low-cost, low-resources processors. Second, the experiments showed that in some cases the number of Fp operations is not enough to accurately estimate the overall performance of an ECC-based cryptosystem.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129549025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automation and evaluation of the semantic annotation of Web resources","authors":"S. Maalej, A. Jedidi, R. Bouaziz","doi":"10.1109/ICITST.2013.6750239","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750239","url":null,"abstract":"The annotation of a Web page allows associating a semantic to the content of this page. But with the great mass of pages managed through the world, and especially with the advent of the Web, their manual annotation is impossible. In this paper we will focus on the semi-automatic annotation of the Web pages, we will propose an approach and a framework for semantic annotation of Web pages entitled “Querying Web”. Our solution is based on the enriched domain ontologies and on the analysis of the RDF result by the “Semantic Radar” plug-in. We will also present in this paper an evaluation of the automation made by our framework.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"279 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113993787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smartphone security: Overview of security software solutions","authors":"D. Fischer, B. Markscheffel, T. Seyffarth","doi":"10.1109/ICITST.2013.6750208","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750208","url":null,"abstract":"The market of security software solutions for smartphones has grown considerably in the last few years. A wide range of products is available. The objective of our work is to develop an overview of security software solutions for smartphones. At first we identify basic threats and typical security measures for smartphones. Then we explore current security software solutions and describe how these can be classified. Furthermore, we analyse which security software solutions (respectively classes of security software solutions) can prevent or mitigate which threats.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124686047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}