Reyner Aranta Lika, D. Murugiah, S. Brohi, D. Ramasamy
{"title":"NotPetya: Cyber Attack Prevention through Awareness via Gamification","authors":"Reyner Aranta Lika, D. Murugiah, S. Brohi, D. Ramasamy","doi":"10.1109/ICSCEE.2018.8538431","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538431","url":null,"abstract":"NotPetya, when released in 2017, was believed to be ransomware. NotPetya injects malicious codes in the computer and then attempts to gain administrator access. Following that, it infects other computers in the network. NotPetya uses the EternalBlue Server Message Block (SMB) exploit to conduct the attacks. The hard drives get encrypted, and when the computer is booted, the ransom note is displayed. NotPetya does not provide enough information for a decryption key to be produced, making it a malware. Businesses across industries have been affected without having an opportunity for system recovery. While definite solutions are lacking, vaccines exist, where, the presence of a local file, blocks the NotPetya execution. Activating the vaccine can be tedious and cumbersome for average computer users. Hence, our solution is intended to educate them in an interactive manner. Users will be more susceptible towards the vaccination while learning about security habits that need to be practiced. From this, average computer users can walk away with the knowledge that can protect them from future attacks.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121901914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effect of the Organization Factors, Technology and Social Influences on E-Government Adoption in Jordan","authors":"Y. El-Ebiary","doi":"10.1109/ICSCEE.2018.8538394","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538394","url":null,"abstract":"An Electronic Government employs the Information and Communication Technology (ICT) to improve the functions of public organizations and their activities. And some references define the e-Government as an application running over the internet, or just an intermediary that interacts between government and external environment. The essential objective of this study is to inspect the innovation diffusion theory with the external factor, the social influences. This research is a quantitative study using survey approach. In the current research, the target population exists in Jordan. The citizen opinions are very important for the investigation on using egovernment behavior. Findings in this paper propose some factors that are important for the behavior intention in egovernment in Jordan. The most significant factor is the behavior intension to use appears to be adoptions and facilitated by the usefulness of e-government services, and other benefits of governments lead to more acceptances among Jordan’s citizens.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115170701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Robust Method for Identification of Paper Currency Using Otsu’s Thresholding","authors":"M. A. Ansari, Suresh Kumar Mahraj","doi":"10.1109/ICSCEE.2018.8538424","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538424","url":null,"abstract":"In this modern world, the correct identification of paper currency is an essential need for the automation of current systems. The automatic currency identification method is highly required to reduce the human power in recognizing the currency and its associated value. Sometimes, the damaged or blurred currency and the complex design of the currency make the task of identification much difficult. In this paper, a method is proposed that can identify paper currency by considering the identification marks given on the currency. Specifically, this study focuses on the identification of Pakistani paper currency. The proposed method makes use of the fundamental image processing techniques for differentiating the major denominations. Particularly, the proposed algorithm uses Otsu’s thresholding method and circulatory matrix criteria for locating the special identity marks given on the currency. The effectiveness of the proposed approach has been shown by performing various experiments on all of the major denominations of Pakistani paper currency with varying intensities. The Proposed method shows quite satisfactory results in terms of accuracy and efficiency.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115386740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Complex Plane Spectral Subtraction Method for Vehicle Interior Speaker Recognition Systems","authors":"Shuiping Wang, Shiqiang Li, Chunnian Fan","doi":"10.1109/ICSCEE.2018.8538418","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538418","url":null,"abstract":"The performance of speaker recognition systems drops significantly under vehicle interior noisy conditions. The traditional spectral subtraction algorithm is a popular method for noise reduction but suffers from musical noise distortion. To compensate for this problem, we proposed a new complex plane approach for spectral subtraction. The proposed method rectifies the incorrect assumption about the cross terms involving the phase difference between the clean speech and noise signals being zero. We assessed the novel speech enhancement method using utterances corrupted by volvo car-interior noises in different signal-to-noise ratios (SNRs) levels. Spectrogram analysis results show that the complex plane method performs significantly better than the traditional spectral subtraction algorithm. In addition, the new speech enhancement method was evaluated by three groups of speaker data from the TIMIT database with a 32-order Gaussian Mixture Model (GMM) based speaker recognition system. The experiments revealed that the proposed approach performed better than the traditional spectral subtraction in the pre-processing stage of speaker recognition systems1.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115747395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Suliman Mohamed Fati, Amgad Muneer, Dheeraj Mungur, Ahmad Badawi
{"title":"Integrated Health Monitoring System using GSM and IoT","authors":"Suliman Mohamed Fati, Amgad Muneer, Dheeraj Mungur, Ahmad Badawi","doi":"10.1109/ICSCEE.2018.8538366","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538366","url":null,"abstract":"This paper proposes a health monitoring system for the patient in a coma based on GSM and Internet of Things (IoT). In this proposed system, the four health parameters implemented are LM35 temperature sensor, heartbeat sensor, accelerometer sensor and eye blink sensor. Using these four parameters simultaneously, it has been monitored the coma patient’s condition. Hence ruling out the use of the thermometer and other devices to check the condition of the patient. Consequently, there is no need for a lot of clinical staff nor accompanying persons to be physically present to check the condition of the patient because there is GSM module to send SMS message to the mobile phone of the person in charge (nurses/doctor) in case there is any abnormalities in health parameters. Moreover, this system uses Wi-Fi for IoT wherein “Thingspeak” is used to monitor the coma patient online via mobile phone. Alternatively, the patient’s relative can log in easily to the system to check the patient statues. The IoT shows the results online of body temperature, heartbeat, body movement and eye blink along with the time and the date for each parameter. Additionally, the results achieved for the body temperature and the heartbeat are 360° and 87 BPM respectively. Finally, the results obtained by the MPU-6050 gyroscope and the eye blink sensor were very satisfactory.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"47 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126048487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face recognition and detection using Random forest and combination of LBP and HOG features","authors":"HUDA. H. Mady, Shadi M. S. Hilles","doi":"10.1109/ICSCEE.2018.8538377","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538377","url":null,"abstract":"the effective facial recognition method should perform well in unregulated environments based on video broadcast to satisfy the demands of applications in real-world However, this still remains a big challenge for most current face recognition algorithms that will affect the accuracy of the system. This study was conducted to develop face recognition method based on video broadcast under illumination variation, facial expressions, different pose, orientation, occlusion, nationality variation and motion. Viola-Jones algorithm was applied to improve face detection which is these method have proven to detect the faces in an uncontrolled environment in the real world simply and high accuracy. A combination of Histograms of Oriented Gradients (HOG) and Local Binary Pattern (LBP) descriptors was conducted for faces features extraction purpose. These descriptors have proven to be lower computational time. The latest and accurate technique was applied for face classification based on Random Forest classifier (RF). To evaluate the efficiency of the Random Forest classifier, compared it with Support Vector Machine classifiers (SVM) is done with different existing feature extraction methods. Four experiments were implemented on Mediu staff database and excellent results have reported the efficiency of proposed algorithm average recognition accuracy 97.6% The Computer Vision and Image Processing MAT LAB 2016b Toolboxes was used for coding the desired system, dataset based on videos.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126642230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reducing USB Attack Surface: A Lightweight Authentication and Delegation Protocol","authors":"Arash Mahboubi, S. Çamtepe, Hasmukh Morarji","doi":"10.1109/ICSCEE.2018.8538400","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538400","url":null,"abstract":"A privately owned smart device connected to a corporate network using a USB connection creates a potential channel for malware infection and its subsequent spread. For example, air-gapped (a.k.a. isolated) systems are considered to be the most secure and safest places for storing critical datasets. However, unlike network communications, USB connection streams have no authentication and filtering. Consequently, intentional or unintentional piggybacking of a malware infected USB storage or a mobile device through the air-gap is sufficient to spread infection into such systems. Our findings show that the contact rate has an exceptional impact on malware spread and destabilizing free malware equilibrium. This work proposes a USB authentication and delegation protocol based on radiofrequency identification (RFID) in order to stabilize the free malware equilibrium in air-gapped networks. The proposed protocol is modelled using Coloured Petri nets (CPN) and the model is verified and validated through CPN tools.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122309887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extended User Centered Design (UCD) Process in the Aspect of Human Computer Interaction","authors":"A. Mithun, W. Yafooz","doi":"10.1109/ICSCEE.2018.8538388","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538388","url":null,"abstract":"Design methodology of the Human-computer interaction (HCI) ensures stability, efficiency, and usability of the future artifacts. HCI concerned for the development of interaction methods as well as user interfaces. Several methods are used since the term HCI was coined. HCI methodologies are formed into various certain features and the features are based on the user acceptance, usability, and technical issues, indeed each method based on a specific affair. A method or process ‘User-Centered design’ (UCD) is exercising in a broad area of HCI. In spite of existing UCD process significance, in a while, several boundaries and limitations arise during the development of the artifacts. UCD process is not static, and the variations in UCD incorporated into various approaches depending on needs, and task. The principle of UCD process is to involve the user participation in the development to ensure users demand and interests. For the variations of UCD process researchers are developing the model by extending diverse technical and conceptual terms depending on respective activities, therefore occasionally the process draws inappropriate images of the future artifacts, although ISO 9241-210 defined an ideal UCD process guidelines to HCI development. This research analyzed the significance, usability, and the absence of existing UCD process and extended a conceptual term as Elicitation. Respective section illustrated the extended term significance, practice and approaches to HCI design. The key concern is to develop the UCD method in this research, alongside discuss the existing methods limitations and absences for future HCI development.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114349005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Latent Fingerprint Enhancement Based On Directional Total Variation Model With Lost Minutiae Reconstruction","authors":"A. Liban, Shadi M. S. Hilles","doi":"10.1109/ICSCEE.2018.8538417","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538417","url":null,"abstract":"Latent fingerprint matching assists for law enforcement agencies to identify criminals. Image enhancement plays an important role in automatic latent fingerprint segmentation and matching systems. Even-though sufficient progress done in both rolled and plain fingerprint images enhancement, latent fingerprint enhancement still a challenging problem and existing issue in the current research. This is due to the existence of poor quality images in latent fingerprint with unclear ridge structure and various overlapping patterns together with presence of structured noise. Prior to latent fingerprint segmentation and feature extraction, latent fingerprint image enhancement is necessary step to suppress different noises and improve the clarity of ridge structure. This paper reviews the current techniques used for the latent fingerprint enhancement. Thus, it presents hybrid model which is combination of edge directional total variation model (EDTV) and quality image enhancement with lost minutia reconstruction. NIST SD27 database has been used to test the proposed techniques and RMSE, PSNR to measure the performance. The result of the proposed technique shows enhancement of clarity of input latent fingerprint images and well de-noising of good, bad and ugly images of latent fingerprint. There is a statistically significant difference in the mean length of PSNR and RMSE for different categories of the latent fingerprint images (good, bad and ugly). It’s observed that the proposed technique performs well for the good latent fingerprint images compare to bad and ugly images. The result after enhancement present RMSE average 0.018373, 0.022287, and 0.023199 for the three different image categories available in SD27 data set good, bad and ugly images respectively while the PSNR average achieved 82.99068, 81.39749, and 81.07826 respectively. The proposed enhancement technique improved the matching accuracy of latent fingerprint images about 30{%","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131718502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Teoh, G. Chiew, E. J. Franco, P. C. Ng, M. Benjamin, Y. Goh
{"title":"Anomaly detection in cyber security attacks on networks using MLP deep learning","authors":"T. Teoh, G. Chiew, E. J. Franco, P. C. Ng, M. Benjamin, Y. Goh","doi":"10.1109/ICSCEE.2018.8538395","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538395","url":null,"abstract":"Malicious traffic has garnered more attention in recent years, owing to the rapid growth of information technology in today’s world. In 2007 alone, an estimated loss of 13 billion dollars was made from malware attacks. Malware data in today’s context is massive. To understand such information using primitive methods would be a tedious task. In this publication we demonstrate some of the most advanced deep learning techniques available, multilayer perceptron (MLP) and J48 (also known as C4.5 or ID3) on our selected dataset, Advanced Security Network Metrics & Non-Payload-Based Obfuscations (ASNM-NPBO) to show that the answer to managing cyber security threats lie in the fore-mentioned methodologies.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131215061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}