{"title":"MapReduce: A critical analysis of existing authentication methods","authors":"I. Lahmer, Ning Zhang","doi":"10.1109/ICITST.2015.7412110","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412110","url":null,"abstract":"The use of MapReduce (MR) model has attracted much attention because of the reductions in the costs involved in satisfying the storage and computational demands. However, authentication methods proposed for such model is subjected with rooms for improvements. In the initial design and implementation of the MR model such as Hadoop, issues of security including authentication was not considered. It was assumed that the underlying system worked in a trustworthy environment, so MR developers did not provide authentication methods in the MR model. This assumption is still valid to some extent, whereas major IT players in the world, such as Facebook and Yahoo have implemented the MR model in their private clouds. However, recently there are efforts to provide the MR model in public clouds. Inadequate authentication methods for the MR model in such environment makes the job execution work-flow vulnerable to many attacks such as impersonation and spoofing attacks. So as part of our work to design a secure and effective authentication solution for the MR model, this paper examines and critically analyses the state-of-the-art in MR authentication methods against a general set of specified requirements. It is to identify limitations, weaknesses, and missing features in the proposed authentication methods for the MR model.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123843030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transparent high capacity audio watermarking in wavelet domain","authors":"Mehdi Fallahpour, D. Megías","doi":"10.1109/ICITST.2015.7412098","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412098","url":null,"abstract":"This paper suggests a novel high capacity audio watermarking technique by using the high frequency band of the wavelet decomposition, for which the human auditory system is not very sensitive to variation. The high frequency band, DD, is divided into four parts and, then, in each step, a single sample from each part is selected. The sum of the selected wavelet samples is used for embedding the secret bits. The robustness and imperceptibility of the proposed scheme are adjustable by varying a tuning parameter. The outstanding feature of the suggested technique is the capacity to limit the changes of the wavelet samples, which guarantees the transparency of the embedding method. The experimental results show that the technique has very high capacity (about 2756 bps), without significant perceptual distortion (ODG in [-1, 0] and SNR about 42.1 dB) and provides robustness against MPEG compression (MP3).","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127798006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study on the flame detection and object classification technique using the color information","authors":"Min-Gu Kim, S. Pan","doi":"10.1109/ICITST.2015.7412070","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412070","url":null,"abstract":"With the development of construction techniques, the high-rise buildings have been established and populated. In the event of fire in these buildings, as the fire is spreading, the risk of large fire is increased and the resulting casualties and property damages are increased. Therefore, the techniques to detect the flame at an early stage are necessary in order to prevent the fire and minimize the damage. The flame detection technique based on physical sensor has limited disadvantages in detecting the fire early. In addition, this technique has a problem of increasing the cost in proportion to the number of regions where it is installed. Image-based flame detection technique has been studied to complement these problems. In this paper, the object is detected by using the adaptive background modeling technique. In the flame detection technique, the flame is detected by converting RGB images to HSI images which have strength even in the change of lightings or scenes. Also, if the object with similar color to the flame is detected from the output image, it will detect it as a fire, leading to increase the misdetection problem. To solve these problems, objects are classified by using the direction information of the object detected. Based on experiment results, if the flame is detected only using the color information, it is confirmed that the fire is detected in real time. However, the problem of classifying the object as the fire occurred when the object had the similar color to the flame in the image. For this, it is confirmed that the performance was improved when classifying the object using the direction information of the object.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126525360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and privacy framework for ubiquitous healthcare IoT devices","authors":"Ebrahim Al Alkeem, C. Yeun, M. Zemerly","doi":"10.1109/ICITST.2015.7412059","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412059","url":null,"abstract":"With the support of the wearable devices, healthcare services started a new phase in serving patients need. The new technology adds more facilities and luxury to the healthcare services, Also changes patients' lifestyles from the traditional way of monitoring to the remote home monitoring. Such new approach faces many challenges related to security as sensitive data get transferred through different type of channels. They are four main dimensions in terms of security scope such as trusted sensing, computation, communication, privacy and digital forensics. In this paper we will try to focus on the security challenges of the wearable devices and IoT and their advantages in healthcare sectors.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125586346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attacks on Web browsers with HTML5","authors":"Soojin Yoon, Jonghun Jung, Hwan-Kuk Kim","doi":"10.1109/ICITST.2015.7412087","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412087","url":null,"abstract":"The new Web standard HTML5 makes a webpage provide dynamic functions to users without additional plug-ins such as ActiveX, Flash and Silverlight. Most attacks on web browsers uses such plug-ins. HTML5 provides the abilities that can be substituted to plug-ins, so hackers focus their attacks with HTML5. This paper surveys 16 attacks with HTML5 presented and shows their effects. Additionally, three new attacks with HTML5 are also discussed.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121502303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bi-directional traffic management support system with decision tree based dynamic routing","authors":"Md. Rahatur Rahman, S. Akhter","doi":"10.1109/ICITST.2015.7412080","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412080","url":null,"abstract":"Road traffic management is an ongoing challenge. Machine vision (image processing), RFID gates, aerial surveillance, and/or remote sensors technologies are usually used to reduce traffic management problems. However, their major drawbacks are installation difficulties, maintenance over the time, error handling, coverage and cost effectiveness. Thus, low-cost, flexible, easily maintainable and secure traffic management support systems are in demand. Internet-based real time bidirectional communication can be an alternation to solve most of the addressed problems. It can provide significant benefits over the existing surveillance technologies in use to monitor road traffic condition. In addition, dynamic routing is a vital requirement to make the proposed system more realistic. Therefore, decision tree based logic is applied to calculate the road segment weights and provide dynamic routing. The results indicate that the proposed traffic management support system/tool with dynamic routing (weights) is much more effective to find the optimal routes.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115079372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Equilibrium properties of rate control protocols","authors":"Abhijit Kiran Valluri","doi":"10.1109/ICITST.2015.7412109","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412109","url":null,"abstract":"We analyze the stability of the Rate Control Protocol (RCP) using two different models that have been proposed in literature. Our objective is to better understand the impact of the protocol parameters and the effect different forms of feedback have on the stability of the network. We also highlight that different time scales, depending on the propagation delay relative to the queuing delay, have an impact on the nonlinear and the stochastic properties of the protocol fluid models. To better understand some of the nonlinear properties, we resort to local bifurcation analysis where we exhibit the existence of a Hopf type bifurcation that then leads to stable limit cycles. Our work serves as a step towards a more comprehensive understanding of the nonlinear fluid models that have been used as representative models for RCP. We hope that this work contributes to the knowledge gap and helps researchers understand RCP models in a better light.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114330993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PhD and doctorate consortium","authors":"C. Shoniregun","doi":"10.1109/WCICSS.2015.7420313","DOIUrl":"https://doi.org/10.1109/WCICSS.2015.7420313","url":null,"abstract":"Provides an abstract for each of the presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128241223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicting multi-stage attacks based on IP information","authors":"Abdulrazaq Almutairi, D. Parish, James A. Flint","doi":"10.1109/ICITST.2015.7412127","DOIUrl":"https://doi.org/10.1109/ICITST.2015.7412127","url":null,"abstract":"Multi-stage attacks can evolve dramatically, causing much loss and damage to organisations. These attacks are frequently instigated by exploiting actions, which in isolation are legal, and are therefore particularly challenging to detect. Much research has been conducted in the multi-stage detection area, in order to build a framework based on an events correlation approach. This paper proposes a framework that predicts multi-stage attacks based on a different approach, which is an IP information evaluation. This approach was chosen after analysing three different multi-stage attack scenarios. This paper shows the analysis of those scenarios, detailing their steps and information hitherto unexploited in current intrusion detection systems. The paper also details the results obtained in the evaluation process, including detection and false positive rates.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126260001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}