8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)最新文献

筛选
英文 中文
Reinforcing network security by converting massive data flow to continuous connections for IDS 通过将大量数据流转换为IDS的连续连接来增强网络安全性
Maher Salem, Ulrich Bühler
{"title":"Reinforcing network security by converting massive data flow to continuous connections for IDS","authors":"Maher Salem, Ulrich Bühler","doi":"10.1109/ICITST.2013.6750267","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750267","url":null,"abstract":"Processing massive data flow in intrusion detection systems (IDS) become a serious challenge. It is considered as a major deficiency while handling heterogeneous and non-stationary data stream to uncover anomaly in the online operational mode. This paper proposes a novel online method that constructs connections from the massive data flow for evaluating IDS models. The proposed method overcomes this challenge by using a queuing concept of dynamic window size. It captures network traffic and hosts events constantly and handles them synchronously within time slot windows inside the queue in order to construct connection vectors based on certain features. We have evaluated the method in offline mode using DARPA dump data flow and in online mode using a simulated network at the university campus. In addition, we have evaluated our IDS model using the constructed connections to proof the feasibility and plausibility of the proposed method in IDS area. The performance evaluation confirms that, the proposed method is able to operate in offline as well online modes efficiently. Moreover, constructed connections are very adequate for training and evaluating IDS models.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132740477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Edge detection methods in palm-print identification 掌纹识别中的边缘检测方法
O. Akinsowon, B. K. Alese
{"title":"Edge detection methods in palm-print identification","authors":"O. Akinsowon, B. K. Alese","doi":"10.1109/ICITST.2013.6750235","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750235","url":null,"abstract":"Biometric recognition, or simply biometrics, refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. By using biometrics it is possible to confirm or establish an individual's identity based on “who she is”, rather than by “what she possesses” (e.g., an ID card) or “what she remembers” (e.g., a password). Today, it is becoming more and more popular to use biometrics to identify people and authenticate them for access to secure areas and systems. Biometric has been getting more and more attention after the September 9/11 episode in America. It is a unique, measurable characteristic or trait of a human being for automatically recognizing or verifying identity. This paper spotlights biometric recognition as a key form of identification, one which is increasingly used in a wide range of applications made possible by advanced pattern recognition algorithms applied through powerful ICT.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133837061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Cloud Enabled Social Media Monitoring Platform for Events Detection and Prediction 用于事件检测和预测的云社交媒体监控平台
E. Benkhelifa, T. Welsh
{"title":"A Cloud Enabled Social Media Monitoring Platform for Events Detection and Prediction","authors":"E. Benkhelifa, T. Welsh","doi":"10.1109/ICITST.2013.6750179","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750179","url":null,"abstract":"The data mined from social networks has been shown to have an inherent wealth of information. However the heterogeneous nature of this data along with difficulties in predetermining its rate and source makes collecting and aggregating it an often inefficiently run task. This paper presents a platform which leverages some of the architecture and features of Cloud computing in order to dynamically scale resources according to data rate, so as to collect and parse data from a variety of social media sources in an economical manner. The nature of the platform means that it may be applied to a variety of social network monitoring tasks, which may take advantage of the dynamic and economical nature of Cloud-based architectures. This paper addresses a gap in the current literature and proposes a novel Cloud Enabled Social Media Monitoring Platform for Events Detection and Prediction.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131210234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Trustworthy evidence gathering mechanism for multilayer cloud compliance 可信赖的多层云合规证据收集机制
M. Florian, Sarita Paudel, Markus Tauber
{"title":"Trustworthy evidence gathering mechanism for multilayer cloud compliance","authors":"M. Florian, Sarita Paudel, Markus Tauber","doi":"10.1109/ICITST.2013.6750257","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750257","url":null,"abstract":"Cloud Computing allows the designing of systems which dynamically acquire compute resources. This makes it very suitable for Critical Infrastructures where unpredictable load due to human usage patterns are very likely. Especially in this domain legal compliance is a growing concern in general. Abstraction over multiple architectural cloud layers allows for individual layers being operated by different providers. This makes it hard to determine whether legal compliance is given. In this paper we motivate the research towards an Event Gathering Mechanism which is envisioned to allow the modelling of legal aspects in a multi layered cloud environment.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114942138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cloud security and compliance concerns: Demystifying stakeholders' roles and responsibilities 云安全和遵从性问题:揭开涉众角色和责任的神秘面纱
Muteveri Kandira, J. Mtsweni, Keshnee Padayachee
{"title":"Cloud security and compliance concerns: Demystifying stakeholders' roles and responsibilities","authors":"Muteveri Kandira, J. Mtsweni, Keshnee Padayachee","doi":"10.1109/ICITST.2013.6750284","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750284","url":null,"abstract":"Cloud computing is a new computing model that may offer numerous benefits to potential users. The sharing of dynamically scalable resources such as computing, storage, and infrastructure via the internet could enhance an organisation's growth through the reduction of IT costs. However, research has shown that cloud computing has various security and compliance concerns. The ancillary objective of this paper is to identify the security and compliance concerns that organisations are likely to encounter when choosing to adopt and use cloud services. Consequently, the main contribution of this paper is the identification of roles and responsibilities of the stakeholders who are central in addressing these security and compliance concerns in the cloud platform.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121363290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Web Service constraint optimization Web服务约束优化
Aspen Olmsted, C. Farkas
{"title":"Web Service constraint optimization","authors":"Aspen Olmsted, C. Farkas","doi":"10.1109/ICITST.2013.6750204","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750204","url":null,"abstract":"In this paper we investigate the problem of providing consistency, availability and durability for Web Service transactions. We consider enforcement of integrity constraints in a way that increases availability while guaranteeing the correctness specified in the constraint. We study hierarchical constraints that offer an opportunity for optimization because of an expensive aggregation calculation required in the enforcement of the constraint. We propose an approach that guarantees that the constraint cannot be violated and also allow the distribution of write operations among many clusters to increase availability. In our previous work, we proposed a replica update propagation method, called the Buddy System, which guaranteed durability and increased availability of web services. In this paper we extend the Buddy System to enforce hierarchical data integrity constraints.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123136867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A recommendation scheme utilizing Collaborative Filtering 一种基于协同过滤的推荐方案
N. Dzugan, Lance Fannin, S. Makki
{"title":"A recommendation scheme utilizing Collaborative Filtering","authors":"N. Dzugan, Lance Fannin, S. Makki","doi":"10.1109/ICITST.2013.6750170","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750170","url":null,"abstract":"The proliferation of computers as handheld devices with Internet connectivity along with ecommerce and social networking sites allow the generation of huge amount of data. This data empowers the corporations and other organizations to produce meaningful business patterns from consumers' behavior. Also, they can build recommender systems to predict future social trends which can enhance their services and improve their products. For example, The recommendation systems used by companies such as Amazon, Google News, and Netflix utilize Collaborative Filtering techniques such as k-nearest neighbor (kNN) to discover what their users like and dislike. Using kNN, the system compares a primary user with all others and determines how similar their interests are to the primary user's. Doing so creates a neighborhood list, consisting of every user's similarity to the primary user. Using this list, it is easy to determine the primary user's most similar, or nearest neighbor. This nearest neighbor will then provide the basis for the primary user's recommendations. In this research, we present a realistic method to process large data sets collected from Internet for recommending bookmarks by using kNN in a variation of Collaborative Filtering called One-Class Collaborative Filtering (OCCF).","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133893055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Embedded implementation of Edwards curve- and extended Jacobi quartic curve-based cryptosystems 基于Edwards曲线和扩展Jacobi四次曲线的密码系统的嵌入式实现
C. Peretti, P. Gastaldo, M. Stramezzi, R. Zunino
{"title":"Embedded implementation of Edwards curve- and extended Jacobi quartic curve-based cryptosystems","authors":"C. Peretti, P. Gastaldo, M. Stramezzi, R. Zunino","doi":"10.1109/ICITST.2013.6750229","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750229","url":null,"abstract":"This research addresses the computationally-effective implementation of cryptographic protocols based on elliptic curves, and targets in particular cryptosystems that should be hosted on embedded programmable processors. In principle, the implementation of Elliptic Curve Cryptography (ECC) requires one to deal with different design options, which stem from the available degrees of freedom: elliptic curve family, coordinate system, and point multiplication procedure. On the other hand, theoretical studies already proved that exist only a few setups leading to computational efficient implementations. The goal of present paper is to analyze from an applicative point of view such setups, which mainly involve two specific families of elliptic curves: Edwards curves and extend Jacobi quartic curves. The presented experimental session shows a few interesting outcomes; first, ECC schemes implemented by using either Edwards curves or extended Jacobi quartic curves can obtain remarkable performances in terms of computational efficiency also on low-cost, low-resources processors. Second, the experiments showed that in some cases the number of Fp operations is not enough to accurately estimate the overall performance of an ECC-based cryptosystem.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129549025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automation and evaluation of the semantic annotation of Web resources Web资源语义标注的自动化与评价
S. Maalej, A. Jedidi, R. Bouaziz
{"title":"Automation and evaluation of the semantic annotation of Web resources","authors":"S. Maalej, A. Jedidi, R. Bouaziz","doi":"10.1109/ICITST.2013.6750239","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750239","url":null,"abstract":"The annotation of a Web page allows associating a semantic to the content of this page. But with the great mass of pages managed through the world, and especially with the advent of the Web, their manual annotation is impossible. In this paper we will focus on the semi-automatic annotation of the Web pages, we will propose an approach and a framework for semantic annotation of Web pages entitled “Querying Web”. Our solution is based on the enriched domain ontologies and on the analysis of the RDF result by the “Semantic Radar” plug-in. We will also present in this paper an evaluation of the automation made by our framework.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"279 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113993787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Smartphone security: Overview of security software solutions 智能手机安全:安全软件解决方案概述
D. Fischer, B. Markscheffel, T. Seyffarth
{"title":"Smartphone security: Overview of security software solutions","authors":"D. Fischer, B. Markscheffel, T. Seyffarth","doi":"10.1109/ICITST.2013.6750208","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750208","url":null,"abstract":"The market of security software solutions for smartphones has grown considerably in the last few years. A wide range of products is available. The objective of our work is to develop an overview of security software solutions for smartphones. At first we identify basic threats and typical security measures for smartphones. Then we explore current security software solutions and describe how these can be classified. Furthermore, we analyse which security software solutions (respectively classes of security software solutions) can prevent or mitigate which threats.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124686047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信