2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

筛选
英文 中文
MapReduce: A critical analysis of existing authentication methods MapReduce:对现有认证方法的关键分析
I. Lahmer, Ning Zhang
{"title":"MapReduce: A critical analysis of existing authentication methods","authors":"I. Lahmer, Ning Zhang","doi":"10.1109/ICITST.2015.7412110","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412110","url":null,"abstract":"The use of MapReduce (MR) model has attracted much attention because of the reductions in the costs involved in satisfying the storage and computational demands. However, authentication methods proposed for such model is subjected with rooms for improvements. In the initial design and implementation of the MR model such as Hadoop, issues of security including authentication was not considered. It was assumed that the underlying system worked in a trustworthy environment, so MR developers did not provide authentication methods in the MR model. This assumption is still valid to some extent, whereas major IT players in the world, such as Facebook and Yahoo have implemented the MR model in their private clouds. However, recently there are efforts to provide the MR model in public clouds. Inadequate authentication methods for the MR model in such environment makes the job execution work-flow vulnerable to many attacks such as impersonation and spoofing attacks. So as part of our work to design a secure and effective authentication solution for the MR model, this paper examines and critically analyses the state-of-the-art in MR authentication methods against a general set of specified requirements. It is to identify limitations, weaknesses, and missing features in the proposed authentication methods for the MR model.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123843030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Transparent high capacity audio watermarking in wavelet domain 小波域透明高容量音频水印
Mehdi Fallahpour, D. Megías
{"title":"Transparent high capacity audio watermarking in wavelet domain","authors":"Mehdi Fallahpour, D. Megías","doi":"10.1109/ICITST.2015.7412098","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412098","url":null,"abstract":"This paper suggests a novel high capacity audio watermarking technique by using the high frequency band of the wavelet decomposition, for which the human auditory system is not very sensitive to variation. The high frequency band, DD, is divided into four parts and, then, in each step, a single sample from each part is selected. The sum of the selected wavelet samples is used for embedding the secret bits. The robustness and imperceptibility of the proposed scheme are adjustable by varying a tuning parameter. The outstanding feature of the suggested technique is the capacity to limit the changes of the wavelet samples, which guarantees the transparency of the embedding method. The experimental results show that the technique has very high capacity (about 2756 bps), without significant perceptual distortion (ODG in [-1, 0] and SNR about 42.1 dB) and provides robustness against MPEG compression (MP3).","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127798006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A study on the flame detection and object classification technique using the color information 基于颜色信息的火焰检测与目标分类技术研究
Min-Gu Kim, S. Pan
{"title":"A study on the flame detection and object classification technique using the color information","authors":"Min-Gu Kim, S. Pan","doi":"10.1109/ICITST.2015.7412070","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412070","url":null,"abstract":"With the development of construction techniques, the high-rise buildings have been established and populated. In the event of fire in these buildings, as the fire is spreading, the risk of large fire is increased and the resulting casualties and property damages are increased. Therefore, the techniques to detect the flame at an early stage are necessary in order to prevent the fire and minimize the damage. The flame detection technique based on physical sensor has limited disadvantages in detecting the fire early. In addition, this technique has a problem of increasing the cost in proportion to the number of regions where it is installed. Image-based flame detection technique has been studied to complement these problems. In this paper, the object is detected by using the adaptive background modeling technique. In the flame detection technique, the flame is detected by converting RGB images to HSI images which have strength even in the change of lightings or scenes. Also, if the object with similar color to the flame is detected from the output image, it will detect it as a fire, leading to increase the misdetection problem. To solve these problems, objects are classified by using the direction information of the object detected. Based on experiment results, if the flame is detected only using the color information, it is confirmed that the fire is detected in real time. However, the problem of classifying the object as the fire occurred when the object had the similar color to the flame in the image. For this, it is confirmed that the performance was improved when classifying the object using the direction information of the object.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126525360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security and privacy framework for ubiquitous healthcare IoT devices 无处不在的医疗物联网设备的安全和隐私框架
Ebrahim Al Alkeem, C. Yeun, M. Zemerly
{"title":"Security and privacy framework for ubiquitous healthcare IoT devices","authors":"Ebrahim Al Alkeem, C. Yeun, M. Zemerly","doi":"10.1109/ICITST.2015.7412059","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412059","url":null,"abstract":"With the support of the wearable devices, healthcare services started a new phase in serving patients need. The new technology adds more facilities and luxury to the healthcare services, Also changes patients' lifestyles from the traditional way of monitoring to the remote home monitoring. Such new approach faces many challenges related to security as sensitive data get transferred through different type of channels. They are four main dimensions in terms of security scope such as trusted sensing, computation, communication, privacy and digital forensics. In this paper we will try to focus on the security challenges of the wearable devices and IoT and their advantages in healthcare sectors.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125586346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Attacks on Web browsers with HTML5 使用HTML5攻击Web浏览器
Soojin Yoon, Jonghun Jung, Hwan-Kuk Kim
{"title":"Attacks on Web browsers with HTML5","authors":"Soojin Yoon, Jonghun Jung, Hwan-Kuk Kim","doi":"10.1109/ICITST.2015.7412087","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412087","url":null,"abstract":"The new Web standard HTML5 makes a webpage provide dynamic functions to users without additional plug-ins such as ActiveX, Flash and Silverlight. Most attacks on web browsers uses such plug-ins. HTML5 provides the abilities that can be substituted to plug-ins, so hackers focus their attacks with HTML5. This paper surveys 16 attacks with HTML5 presented and shows their effects. Additionally, three new attacks with HTML5 are also discussed.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121502303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Bi-directional traffic management support system with decision tree based dynamic routing 基于决策树的动态路由双向交通管理支持系统
Md. Rahatur Rahman, S. Akhter
{"title":"Bi-directional traffic management support system with decision tree based dynamic routing","authors":"Md. Rahatur Rahman, S. Akhter","doi":"10.1109/ICITST.2015.7412080","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412080","url":null,"abstract":"Road traffic management is an ongoing challenge. Machine vision (image processing), RFID gates, aerial surveillance, and/or remote sensors technologies are usually used to reduce traffic management problems. However, their major drawbacks are installation difficulties, maintenance over the time, error handling, coverage and cost effectiveness. Thus, low-cost, flexible, easily maintainable and secure traffic management support systems are in demand. Internet-based real time bidirectional communication can be an alternation to solve most of the addressed problems. It can provide significant benefits over the existing surveillance technologies in use to monitor road traffic condition. In addition, dynamic routing is a vital requirement to make the proposed system more realistic. Therefore, decision tree based logic is applied to calculate the road segment weights and provide dynamic routing. The results indicate that the proposed traffic management support system/tool with dynamic routing (weights) is much more effective to find the optimal routes.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115079372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Equilibrium properties of rate control protocols 速率控制协议的平衡性质
Abhijit Kiran Valluri
{"title":"Equilibrium properties of rate control protocols","authors":"Abhijit Kiran Valluri","doi":"10.1109/ICITST.2015.7412109","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412109","url":null,"abstract":"We analyze the stability of the Rate Control Protocol (RCP) using two different models that have been proposed in literature. Our objective is to better understand the impact of the protocol parameters and the effect different forms of feedback have on the stability of the network. We also highlight that different time scales, depending on the propagation delay relative to the queuing delay, have an impact on the nonlinear and the stochastic properties of the protocol fluid models. To better understand some of the nonlinear properties, we resort to local bifurcation analysis where we exhibit the existence of a Hopf type bifurcation that then leads to stable limit cycles. Our work serves as a step towards a more comprehensive understanding of the nonlinear fluid models that have been used as representative models for RCP. We hope that this work contributes to the knowledge gap and helps researchers understand RCP models in a better light.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114330993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PhD and doctorate consortium 博士及博士联盟
C. Shoniregun
{"title":"PhD and doctorate consortium","authors":"C. Shoniregun","doi":"10.1109/WCICSS.2015.7420313","DOIUrl":"https://doi.org/10.1109/WCICSS.2015.7420313","url":null,"abstract":"Provides an abstract for each of the presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128241223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting multi-stage attacks based on IP information 基于IP信息的多阶段攻击预测
Abdulrazaq Almutairi, D. Parish, James A. Flint
{"title":"Predicting multi-stage attacks based on IP information","authors":"Abdulrazaq Almutairi, D. Parish, James A. Flint","doi":"10.1109/ICITST.2015.7412127","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412127","url":null,"abstract":"Multi-stage attacks can evolve dramatically, causing much loss and damage to organisations. These attacks are frequently instigated by exploiting actions, which in isolation are legal, and are therefore particularly challenging to detect. Much research has been conducted in the multi-stage detection area, in order to build a framework based on an events correlation approach. This paper proposes a framework that predicts multi-stage attacks based on a different approach, which is an IP information evaluation. This approach was chosen after analysing three different multi-stage attack scenarios. This paper shows the analysis of those scenarios, detailing their steps and information hitherto unexploited in current intrusion detection systems. The paper also details the results obtained in the evaluation process, including detection and false positive rates.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126260001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信