{"title":"Strengthening the Security of Deniable Authentication Scheme Using Zero-Knowledge Proof","authors":"A. Barmawi, Asep Rizal Nurjaman","doi":"10.1145/3507509.3507513","DOIUrl":"https://doi.org/10.1145/3507509.3507513","url":null,"abstract":"In an electronic voting system, authentication is used to ensure that the voter is legitimate without knowing his/her identity, while the vote collectors verify the data is received from a legitimate user without knowing the identity of the voter. One of the authentication schemes that fulfilled this requirement is called a deniable authentication scheme, where the receiver can prove the source of the message while another party cannot identify the source of the message. In 2013, Li-Takagi et al. proposed a deniable authentication scheme. However, Li-Takagi's scheme has weaknesses if the receiver fully cooperates with the third party. In this case, the third party can identify the source of a given message. In the proposed method, zero-knowledge proof is introduced to preserve the anonymity of the deniable authentication scheme when the receiver fully cooperates with the third party. Based on the analysis, the proposed scheme fulfills the requirement of the deniable authentication scheme when the receiver fully cooperates with the third party. However, the proposed scheme has additional computation costs for securing the shared secret key. Two attack schemes that are carried out on both Li-Takagi and the proposed scheme are the MITM attack and the impersonation attack. The probability of breaking the proposed scheme using an MITM attack is lower than when using Li-Takagi's scheme, but the probability of breaking the proposed scheme using an impersonation attack is the same as Li-Takagi's scheme.","PeriodicalId":280794,"journal":{"name":"Proceedings of the 2021 11th International Conference on Communication and Network Security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114628806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Mahdavifar, Amgad Hanafy Salem, Princy Victor, A. H. Razavi, Miguel Garzon, Natasha Hellberg, Arash Habibi Lashkari
{"title":"Lightweight Hybrid Detection of Data Exfiltration using DNS based on Machine Learning","authors":"S. Mahdavifar, Amgad Hanafy Salem, Princy Victor, A. H. Razavi, Miguel Garzon, Natasha Hellberg, Arash Habibi Lashkari","doi":"10.1145/3507509.3507520","DOIUrl":"https://doi.org/10.1145/3507509.3507520","url":null,"abstract":"Domain Name System (DNS) is a popular way to steal sensitive information from enterprise networks and maintain a covert tunnel for command and control communications with a malicious server. Due to the significant role of DNS services, enterprises often set the firewalls to let DNS traffic in, which encourages the adversaries to exfiltrate encoded data to a compromised server controlled by them. To detect low and slow data exfiltration and tunneling over DNS, in this paper, we develop a two-layered hybrid approach that uses a set of well-defined features. Because of the lightweight nature of the model in incorporating both stateless and stateful features, the proposed approach can be applied to resource-limited devices. Furthermore, our proposed model could be embedded into existing stateless-based detection systems to extend their capabilities in identifying advanced attacks. We release CIC-Bell-DNS-EXF-2021, a large dataset of 270.8 MB DNS traffic generated by exfiltrating various file types ranging from small to large sizes. We leverage our developed feature extractor to extract 30 features from the DNS packets, resulting in a final structured dataset of 323,698 heavy attack samples, 53,978 light attack samples, and 641,642 distinct benign samples. The experimental analysis of utilizing several Machine Learning (ML) algorithms on our dataset shows the effectiveness of our hybrid detection system even in the existence of light DNS traffic.","PeriodicalId":280794,"journal":{"name":"Proceedings of the 2021 11th International Conference on Communication and Network Security","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131942299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meiryani Meiryani, Hanny Franciska, R. Widuri, Suryadiputra Liawatimena, Zaidi Mat Daud, H. Ulinnuha
{"title":"Analysis of Software Accounting Effectiveness on Data Sales in Bliss Kitchen","authors":"Meiryani Meiryani, Hanny Franciska, R. Widuri, Suryadiputra Liawatimena, Zaidi Mat Daud, H. Ulinnuha","doi":"10.1145/3507509.3507523","DOIUrl":"https://doi.org/10.1145/3507509.3507523","url":null,"abstract":"The development of the increasingly advanced business world will certainly always be related to technological developments, especially in the current 4.0 era. In Indonesia, there are various types of companies such as services, manufacturing, food, and others. The development of the company will cause more and more complex transactions. It is very unlikely that the company has to record all forms of operations with a manual system, especially for large companies with so much data that they need a system to help process data quickly so that all transactions can be processed into reliable information. complete and accurate so that the company's goals can be realized. The purpose of this study was to determine the effectiveness of accurate accounting software for recording sales reports in one of the companies that engaged in food & beverage, namely Bliss Kitchen. The research that the writer did used is a quantitative approach with a survey method. This study finds that Accurate software that applied in Bliss kitchen is effective. Evidence shows the results of the questionnaire from Bliss Kitchen employees is positive about Accurate.","PeriodicalId":280794,"journal":{"name":"Proceedings of the 2021 11th International Conference on Communication and Network Security","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116529372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meiryani Meiryani, Noviyanti Hanna Uli Pakpahan, D. Wahyuningtias, Zaidi Mat Daud, Suryadiputra Liawatimena
{"title":"The Role of Financial Technology for Development of Micro, Small and Medium Enterprises (Msmes) in Indonesia","authors":"Meiryani Meiryani, Noviyanti Hanna Uli Pakpahan, D. Wahyuningtias, Zaidi Mat Daud, Suryadiputra Liawatimena","doi":"10.1145/3507509.3507518","DOIUrl":"https://doi.org/10.1145/3507509.3507518","url":null,"abstract":"The rapid development has made financial technology/financial technology's innovations more diverse according to the needs and financial problems that arise. With the existence of financial technology (financial technology) it can also make the financial service process faster, more effective and easier. Because of the development in the field of financial technology with the various solutions offered, this study aims to examine the role of financial technology for the development of MSMEs (Micro and Medium Enterprises), this research also includes aspects of the role of financial inclusion for the development of MSMEs to be able to see how much public knowledge is about financial service products and risk knowledge. The case study in this research is MSMEs in the Tangerang area using quantitative methods. The results of research using multiple linear regression analysis found that the role of financial financial technology for the development of MSMEs has a significant positive effect. Meanwhile, financial inclusion for the development of MSMEs has a positive and insignificant effect on the dependent variable. This study concludes that the use of financial technology for MSME businesses, as well as the high reference to financial products, are important factors in encouraging the development of MSMEs.","PeriodicalId":280794,"journal":{"name":"Proceedings of the 2021 11th International Conference on Communication and Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123956871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of Spectrum Efficiency in UAV Cognitive Communication Network Based on Trajectory Planning","authors":"Yilong Gu, Yangchao Huang, Yuetong Zhang, Qiang-Lin An, Huizhu Han, Youbin Fu, Yanhui Zhang","doi":"10.1145/3507509.3507514","DOIUrl":"https://doi.org/10.1145/3507509.3507514","url":null,"abstract":"In order to solve the shortage of spectrum resources and improve the spectrum efficiency (SE) in unmanned aerial vehicle (UAV) cognitive communication network, this paper optimizes the sensing radian and UAV's real-time trajectory from the perspective of time and space resource allocation. Firstly, the sensing radian is optimized to maximize throughput. Secondly, under the constraints of the primary user (PU) interference threshold, the maximum speed of UAV, the initial and terminal positions of UAV, the flight trajectory of UAV is optimized in real time by iteration algorithm to maximize the throughput. Finally, the SE optimization algorithm based on sensing radian allocation and trajectory planning for UAV cognitive communication is proposed. Simulation results show that the proposed algorithm is effective and better than existing schemes.","PeriodicalId":280794,"journal":{"name":"Proceedings of the 2021 11th International Conference on Communication and Network Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114604357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bidirectional Underwater Blue-green Laser Communication Based on OFDM Modulation","authors":"Lanjun Sun, Shaojun Zhang, Zhenshan Fu, Yue-hong Gong, Yanchao Zhang","doi":"10.1145/3507509.3507516","DOIUrl":"https://doi.org/10.1145/3507509.3507516","url":null,"abstract":"An underwater bidirectional laser wireless communication system based on orthogonal frequency division multiplexing (OFDM) is designed. High-power semiconductor lasers with 450nm and 520nm are employed as the light sources and APD is selected as the detector. Underwater wireless laser LAN communication based on IPV4 protocol is implemented, the communication rate of which can be up to 50Mbps. The blue-green laser communication system has the characteristics of fast transmission rate, high bandwidth, strong secrecy and small volume, which can realize LAN networking and internet connection. It has a good application prospect and practical value in the field of autonomous underwater vehicles and underwater sensor networks.","PeriodicalId":280794,"journal":{"name":"Proceedings of the 2021 11th International Conference on Communication and Network Security","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124598706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TNRAS: Tor Nodes Reliability Analysis Scheme","authors":"Wenzheng Zhang, Tianbo Lu, Zeyu Du","doi":"10.1145/3507509.3507512","DOIUrl":"https://doi.org/10.1145/3507509.3507512","url":null,"abstract":"With the rapid Internet development, the security attacks become more and more noteworthy that people have paid more concentration on personal privacy. The Onion Router (Tor), a distributed anonymous communication network, has gradually come into our field of vision for secure communicating on the Internet. However, there are still several security issues like the Sybil attack in Tor, which pose a non-negligible threat to both the network and its users. This paper proposes an ideal method Tor nodes reliability analysis scheme (TNRAS), Tor nodes reliability analysis scheme, against the Sybil attack. We explore an effective mean to reveal the Sybil or unreliable nodes in Tor. Through analyzing the general characteristics of nodes from six aspects, we can predict the unreliable nodes. We filter them and assess the remaining high reliable nodes for practical application afterwards. After that, the Tor reliable nodes analysis scheme application is implemented and analyzed. Moreover, this paper points out the definition of the Sybil nodes, high reliable nodes, and the reliability, then further assessing the nodes’ reliability. The research reveals the Sybil nodes characteristics through our six aspects detection method, and the predict model achieves to 0.928 training correlation and 0.715 validation correlation both with more than 0.8 ROC, which is of great significance for Tor with its increasing number of users and the worsening network context.","PeriodicalId":280794,"journal":{"name":"Proceedings of the 2021 11th International Conference on Communication and Network Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126556562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Deep Integration of 5G Technology and Social Security Management of Police Department","authors":"Tuo Shi, Yutong Wu","doi":"10.1145/3507509.3507522","DOIUrl":"https://doi.org/10.1145/3507509.3507522","url":null,"abstract":"The application of 5G technology has not only brought technical capabilities in terms of large bandwidth, low latency and wide coverage, but made the social security management of police department face a coexisted new pattern of opportunities and challenges under the support of 5G technology. Based on the current status of the integration and application of 5G technology and police department' social security management, and taking the deep integration as the research content, this paper deeply explores the existing problems in the current integration and the path of the future integration, in order to provide certain ideas and references for the construction and development of police intelligence departments under 5G network technology.","PeriodicalId":280794,"journal":{"name":"Proceedings of the 2021 11th International Conference on Communication and Network Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131740855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mission-Oriented Networks Robustness Based on Cascade Model","authors":"Tengyu Ma, F. Yang, Chao Chang, Jun Huang","doi":"10.1145/3507509.3507521","DOIUrl":"https://doi.org/10.1145/3507509.3507521","url":null,"abstract":"In network science, network connectivity is usually used to evaluate network performance, but this does not represent the services that network systems can provide. Therefore, the robustness of the mission when the network is damaged represents the service survivability of the network. This article introduces missions into the network system and constructs a mission-oriented network model. In this model, the execution of each mission requires resources. When resources are insufficient, the mission is completed by mutual communication and cooperation between nodes. Due to the damage of some nodes in the network system, the allocation of mission resources and the communication path will be changed. This may cause other nodes to fail due to congestion or overload. We build a cascading failure model to describe this process. This paper compares different attack strategies through simulation experiments, and it is found that node resources will play a critical role in robustness.","PeriodicalId":280794,"journal":{"name":"Proceedings of the 2021 11th International Conference on Communication and Network Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133062720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Shallow Underground Space Exploration and IoT Security Monitoring","authors":"Zhaoji Zhang, Qianhui Liu, Xiaorui Chai","doi":"10.1145/3507509.3507517","DOIUrl":"https://doi.org/10.1145/3507509.3507517","url":null,"abstract":"Underground space development intensity is roughly positively related to city scale. At present, underground development depth is about 20 meters in our small cities and 50-70 meters in first-tier cities. Some special projects will have deeper development. The 2014 China Urban Underground Space Development Report White Paper points out: utilization of urban underground space has become a worldwide development trend, and even an important criterion for measuring urban modernization [1]. China has incorporated \"deep land\" (that is, the development and utilization of underground space) into the national strategy and major scientific and technological plan for the expansion of territorial space in the \"13th Five-Year Plan\" outline. To explore deep earth, seek space, resources and safety therefrom, and break through the predicament of urban development, pioneering exploration into the potential and development methods of underground space resources is required [2]. At the same time, security and stability issues exist in underground space. Fine exploration of underground space and reasonable monitoring via Internet of Things are of great significance for better and safe use of underground space.","PeriodicalId":280794,"journal":{"name":"Proceedings of the 2021 11th International Conference on Communication and Network Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123360773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}