{"title":"Signifying ontology complexity for knowledge sharing","authors":"P. Wongthongtham, B. Zadjabbari","doi":"10.1109/ICITST.2009.5402638","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402638","url":null,"abstract":"Ontologies are used in widespread application areas particularly to provide a shared semantically domain knowledge in a declarative formalism for intelligent reasoning. Even ontology enables knowledge sharing however complexity of knowledge being conceptualized in the ontology is critical to the success of knowledge sharing efforts. Other factor like trust in the source of knowledge can also affect knowledge transfer. In this paper we propose metrics to measure the complexity of ontology for knowledge sharing. We have chosen Software Engineering Ontology as our case study.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114153147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The VoIP intrusion detection through a LVQ-based neural network","authors":"Zheng Lu, Taoxin Peng","doi":"10.1109/ICITST.2009.5402626","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402626","url":null,"abstract":"Being a fast-growing Internet application, Voice over Internet Protocol shares the network resources with the regular Internet traffic. However it is susceptible to the existing security holes of the Internet. In this paper, a highly effective VoIP intrusion detection approach based on LVQ neural network is proposed. This detection approach is particularly suitable for protecting VoIP applications, in which various protocols are involved to provide IP telephony services. Experiments of the proposed approach show promising detection accuracy and a low runtime impact on the perceived quality of voice streams.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130376017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Freshness of Web search engines: Improving performance of Web search engines using data mining techniques","authors":"S. Kharazmi, Ali Farahmand Nejad, H. Abolhassani","doi":"10.1109/ICITST.2009.5402607","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402607","url":null,"abstract":"Progressive use of Web based information retrieval systems such as general purpose search engines and dynamic nature of the Web make it necessary to continually maintain Web based information retrieval systems. Crawlers facilitate this process by following hyperlinks in Web pages to automatically download new and updated Web pages. Freshness (recency) is one of the important maintaining factors of Web search engine crawlers that takes weeks to months. Many large Web crawlers start from seed pages, fetch every links from them, and continually repeat this process without any policies that help them to better crawling and improving performance of those. We believe that data mining techniques can help us to improve the freshness parameter by extracting knowledge from crawling data. In this paper we propose a Web crawler that uses extracted knowledge by data mining techniques as policies for crawling. For this purpose we include a component to collect additional crawling information. This crawler starts by non-preferential crawling. After a few crawling, it trained by using mining techniques on crawling data and then uses policies for preferential crawling to improve freshness time. Our research represented that crawling with determined polices has better freshness than generic general purpose Web crawlers.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123812874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Wongthongtham, N. Kasisopha, Surasak Komchaliaw
{"title":"Community-oriented software engineering ontology evolution","authors":"P. Wongthongtham, N. Kasisopha, Surasak Komchaliaw","doi":"10.1109/ICITST.2009.5402557","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402557","url":null,"abstract":"Software Engineering Ontology (SE Ontology) defines common shareable software engineering knowledge and typically provides software engineering concepts: what the concepts are, how they are related, and why they are related. These concepts facilitate common understanding of software engineering knowledge across multiple international software development sites. The SE Ontology is in machine understandable form to facilitate meaningful communication for remote social members. These social members use the SE Ontology but are not involved in the development process. Most existing ontologies including the SE Ontology are designed by individuals or small group of experts, not actual ontology users nor various groups of experts. It is effective if the ontology users can contribute in the process of creating and maintaining the ontologies they use. Social networking is becoming more prevalent enabling people to engage in remote collaboration to form goal-directed social networks. In this paper, we propose a social network based approach for ontology evolution for the SE Ontology. We analyze ontology evolution of the SE Ontology and propose the social network based approach for making ontology evolution more responsive to users' needs.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"51 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121292545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solving security issues using Information Security Awareness Portal","authors":"Annette Tolnai, S. V. Solms","doi":"10.1109/ICITST.2009.5402560","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402560","url":null,"abstract":"The fabrication of formal and confidential information can occur in a matter of seconds owing to the ease and versatility of the electronic medium. Security-related risks increase when we incorporate Internet use into our daily lives. A lack of awareness plays a major role in the security and privacy breach of online users. A comprehensive amount of knowledge is therefore important to enable the user to mitigate online security and privacy-related risks. Every user must understand the environment of the intangible medium of the World Wide Web, in order to decrease the number of people who fall victim to online crimes. This knowledge is covered in the Information Security Awareness Portal (ISAP).","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116503899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maryam Tahajod, Azadeh Iranmehr, Mohammad Reza Darajeh
{"title":"A roadmap to develop enterprise security architecture","authors":"Maryam Tahajod, Azadeh Iranmehr, Mohammad Reza Darajeh","doi":"10.1109/ICITST.2009.5402639","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402639","url":null,"abstract":"Generally speaking, there is no single solution for security architecture in each enterprise; however, there are common elements of security architecture that enterprises should consider when developing their security plan. Security services provide confidentiality, integrity, and availability services for the platform. This paper describes a way to map these security services into overall enterprise security architecture. We demonstrate a framework for understanding disparate design and process considerations; to organize architecture and actions toward improving enterprise security. The security architecture roadmap depicts an approach to map the enterprise's goals to a logical view for security, which is set of security policy and standards, security architecture, and risk management domains. The decisions in the logical layer drive the security processes through design time to run time.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114689008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards secure information systems in online banking","authors":"Zakaria Karim, K. Rezaul, Aliar Hossain","doi":"10.1109/ICITST.2009.5402619","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402619","url":null,"abstract":"In this era of globalization, information security is becoming more important because the world is becoming highly interconnected with the internet. At present customers can do banking online which is easy and time saving and at the same time they are vulnerable to threats. This paper seeks to investigate the current debate regarding the threats and vulnerabilities of the information security of online banking and to study some possible remedial actions to defend the threats. The aim of this research is to flesh out and critically analyse data and findings from the research dedicated to the online banking and its information security problems. This would lead to 1) outlining the overview of online banking and its information security system, 2) investigating the specific threats of online banking regarding information security, 3) justifying the role of information security threats in financial losses and the acceptance of online banking by the customers, 4) searching for the critical success factors, and 5) forecasting some possible solutions in the near future. The research finds out the threats of information security of online banking with some real successful fraudulent activities happened in the past and proposes different security measures that can be taken to protect the internet frauds. These measures will help customers to develop awareness by education and training, and improve online services provided by the banks which could develop a safeguard against the frauds by the policy reengineering and using advanced unique technology.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128066639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure biometric system for accessing home appliances via Internet","authors":"A. Mondal, K. Roy, P. Bhattacharya","doi":"10.1109/ICITST.2009.5402631","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402631","url":null,"abstract":"Alongside multitude of innovations and consequential changes in lifestyle, the ability to access home appliances or security cameras over the Internet has been in demand for some years now. In this paper, we propose an efficient, low-cost and user-friendly method to access networked home appliances over the Internet, providing strong, well integrated, three levels of security to the whole application and user data. We present a scheme in which, iris image is used for user authentication and after performing its hashing (using BioHashing), it is sent to the server through a secure communication channel utilizing Secure Socket Layer (SSL). The deterministic feature sequence from the iris image is extracted using 1D log-Gabor filters. Mersenne twister random number generator algorithm is used to produce an array of pseudo-random numbers which is later orthonormalised employing GramSchmidt orthonormalization algorithm for performing BioHashing. In addition to this protected interaction mechanism, we use a single Authentication Server in order to enable access to the home appliances of a complete housing society via Internet, which reduces user responsibility and improves accessibility of this endeavor without compromising on system security. We demonstrate the perfect recognition efficiency of this system with equal error rate (EER) of 0% on CASIA 1 iris image dataset.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121950822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software distribution as a malware infection vector","authors":"Felix Gröbert, A. Sadeghi, M. Winandy","doi":"10.1109/ICITST.2009.5402538","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402538","url":null,"abstract":"The software distribution and usage over the Internet has become an integral part of our daily life. This is an efficient way to make software widely available to users. But it bears the risk of infecting computers with malicious software since many applications are still downloaded and installed without appropriate security measures. Cyber criminals can obviously exploited this situation, but also governments intending to deploy spyware against suspects. In this paper we present an efficient mechanism as well as the corresponding reference implementation for on-the-fly infecting of executable code with malicious software. Our algorithm deploys virus infection routines and network redirection attacks without requiring to modify the application itself. This allows to even infect executables with a embedded signature when the signature is not automatically verified before execution. We briefly discuss counter-measures such as secure channels, code authentication as well as trusted virtualization that enables the isolation of untrusted downloads from trusted applications.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129979052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. K. Vasudevan, K. Venkateshwaran, V. Vaithiyanathan, Subashri Vasudevan
{"title":"Design of analog to digital converter for SDR (Software Defined Radio)","authors":"S. K. Vasudevan, K. Venkateshwaran, V. Vaithiyanathan, Subashri Vasudevan","doi":"10.1109/ICITST.2009.5402602","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402602","url":null,"abstract":"Software defined radio (SDR) is a potential low cost future-proofed solution to the growing number of incompatible wireless standards operating in different frequency bands and different geographical zones. The attractiveness of the concept is that the same hardware platform can be reprogrammed to operate on many different standards. This paper is aimed at designing an 8 bit Analog to Digital Converter for SDR. An analog-to-digital converter is an electronic integrated circuit, which converts an input analog voltage to a digital number. The digital output may be obtained using different coding schemes, such as binary, Gray code or two's complement binary. Based on the response, ADC is classified into Linear and Non-linear ADCs. Among the various types of ADC our contribution towards this project is the design of direct conversion ADC (flash ADC). The above mentioned ADC type has been implemented using CMOS logic style in Cadence IC 5.1.41 tool (Composer Schematic) and the results have been compared with SAR ADC type in terms of speed and area efficiency. The individual modules are designed using 1.2 micron and 0.25 micron TSMC process technologies.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130865383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}