{"title":"A taxonomy on intrusion alert aggregation techniques","authors":"Taqwa Ahmed, M. M. Siraj, A. Zainal, M. Din","doi":"10.1109/ISBAST.2014.7013129","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013129","url":null,"abstract":"As security threats advance in a drastic way, most of the organizations apply various intrusion detection systems (IDSs) to optimize detection and to provide comprehensive view of intrusion activities. But IDS produces huge number of duplicated alerts information that overwhelm security operator. Alert aggregation addresses this issue by reducing, fusing and clustering the alerts. Techniques from a different scope of disciplines have been proposed by researchers for different aspects of aggregation. In this paper we present a comprehensive review on proposed alert aggregation techniques. Our main contribution is to classify the literature based on the techniques applied to aggregate the alerts.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125940274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative analysis of skin color model for face detection","authors":"C. Sumathi, M. Mahadevi","doi":"10.1109/ISBAST.2014.7013088","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013088","url":null,"abstract":"Skin color detection plays an important phase in identifying the face in images. Detecting face has become difficult because of the complexity in facial features and the similarity between those features. To identify a face, one of the basic step is to segment the image based on skin color. The main objective of the paper is to find a color model which is more suitable and shows a good performance in detecting a face. This paper compares each of the skin color models namely HSV, YCBCR, L*a*b for better accuracy. On such comparison, a hybrid skin color model is derived by combining the suitable color component from the three skin color models. After Morphological operations and using connected components a face is detected. After experiments it is observed that the Hybrid color model based skin detection is more suitable with an accuracy of 93%.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123637836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DNA approach for password conversion generator","authors":"Chng Chern Wei","doi":"10.1109/ISBAST.2014.7013114","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013114","url":null,"abstract":"The evolution of an information technology has been expended and growth rapidly since last decade, especially in the era of an internet web technology, such as, e-commence, ebusiness or e-payment or e-shopping and more. The evolution of an internet web technology has made the transmission of the data or information over the web is more comprehensive. Thus, the data or information is easy to hack, crack or spy by the unauthorized persons over the network. This paper proposed a technique of cryptography to make the data or information to be more secure during transmission over the internet technology based on the DNA Stenography with the Finite State Machine (Mealy Machine) theory. This proposed algorithm is able to securing the data or information at least 3 levels of combinations for the password conversion.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123724526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face verification using Local Graph Stucture (LGS)","authors":"E. Abusham","doi":"10.1109/ISBAST.2014.7013098","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013098","url":null,"abstract":"Verification of human face plays an important role in social interaction, such as recognition and security. In this paper, a novel generative approach for face verification based on Local Graph Structure (LGS) description is proposed. A generic face model is considered as a collection of LGS-histograms. Local Graph Structure (LGS) operator is defined as a gray-scale invariant texture measure, derived from a general definition of texture in a local neighborhood. The histograms of the LGS were used for verification, various distance/similarity measures classifiers, namely, the Euclidian distance, the City block distance, the cosine similarity measure and the mahalanobis cosine. The experiments results on standard ORL face database images demonstrated the effectiveness of the proposed method.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126309946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sura Khalil Abd, S. Al-Haddad, F. Hashim, Azizol Abdullah
{"title":"A review of cloud security based on cryptographic mechanisms","authors":"Sura Khalil Abd, S. Al-Haddad, F. Hashim, Azizol Abdullah","doi":"10.1109/ISBAST.2014.7013103","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013103","url":null,"abstract":"Recently, computer users can maintain their data and applications on the Internet and in the central remote server by using a technology called cloud computing. It is a kind of technology that allows users to access their personal files from any device provided with Internet services such technology offers even more applications to be utilized without installation. This paper presents a review of basic security challenges consisting of traditional security issues. It also discusses the additional challenges that take place as a result of using cloud computing model by providers and users of cloud systems. Furthermore, solutions suggested by some researchers are presented with a focus on cryptographic techniques that approve secure cloud storage.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126320917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An enhanced certificateless cryptosystem for mobile ad hoc networks","authors":"Shabnam Kasra Kermanshahi, M. Salleh","doi":"10.1109/ISBAST.2014.7013117","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013117","url":null,"abstract":"Due to the importance of security in many critical applications in MANETs and the limitation of the resources in mobile devices, it is important to have lightweight cryptosystems. Although some lightweight certificateless cryptosystems for MANETs have been proposed, it is possible to improve them in the term of reducing the complexity of the computations. In this paper, we have tried to propose a lightweight certificateless public key cryptographic scheme based on bilinear pairings. In addition, we compared our proposed scheme with other existing certificateless pairing based and result shows that the proposed scheme is more efficient based on computational cost and the rate of growth of computational expense viewpoints.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134387934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Barati, Azizol Abdullah, N. Udzir, R. Mahmod, N. Mustapha
{"title":"Distributed Denial of Service detection using hybrid machine learning technique","authors":"M. Barati, Azizol Abdullah, N. Udzir, R. Mahmod, N. Mustapha","doi":"10.1109/ISBAST.2014.7013133","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013133","url":null,"abstract":"Distributed Denial of Service (DDoS) is a major threat among many security issues. To overcome this problem, many studies have been carried out by researchers, however due to inefficiency of their techniques in terms of accuracy and computational cost, proposing an efficient method to detect DDoS attack is still a hot topic in research. Current paper proposes architecture of a detection system for DDoS attack. Genetic Algorithm (GA) and Artificial Neural Network (ANN) are deployed for feature selection and attack detection respectively in our hybrid method. Wrapper method using GA is deployed to select the most efficient features and then DDoS attack detection rate is improved by applying Multi-Layer Perceptron (MLP) of ANN. Results demonstrate that the proposed method is able to detect DDoS attack with high accuracy and deniable False Alarm.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114785031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Satari, Nor Azlina Abd Rahman, Zety Marlia Zainal Abidin
{"title":"Face recognition for security efficiency in managing and monitoring visitors of an organization","authors":"B. Satari, Nor Azlina Abd Rahman, Zety Marlia Zainal Abidin","doi":"10.1109/ISBAST.2014.7013101","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013101","url":null,"abstract":"This paper discussing on a system that able to manage and monitor the visitors of an organization using face recognition as an authentication method. After the authentication and verification process, valid visitor will be printed with visitor card that will print out the face image of the visitor, date and time of visiting and the name of the person to be visited. Face recognition visitors management system (FRVMS) is proposed to enhance the security of an organization from outsiders that entering the building illegally for certain purposes such as spying or stealing the organization assets. Centralize system enable managing and monitoring process become more efficient. Cost of development is also taking into consideration as this system is not requiring any extra devices. Face recognition is using web camera that is already embedded with the computer. Several similar systems and technologies were reviewed and analyzed before designing the system. A system framework was proposed and prototype was developed. System advantages are highlighted but the main advantages of this system are to enhance the security and cutting cost of system development.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116290482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biometric encryption to enhance confidentiality in Cloud computing","authors":"Malek Najib Omar, M. Salleh, M. Bakhtiari","doi":"10.1109/ISBAST.2014.7013092","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013092","url":null,"abstract":"Virtualization technology is the base technology used in Cloud computing. Therefore, virtualization enables Cloud computing to provide hardware and software services to the users on demand. Actually, many companies migrates to the Cloud computing for many reasons such as capabilities of processor, bus speed, size of storage, memory and managed to reduce the cost of dedicated servers. However, virtualization and Cloud computing contain many security weaknesses that affects the biometric data confidentiality in the Cloud computing. Those security issues are VM ware escape, hopping, mobility, diversity monitoring and etc. Furthermore, the privacy of a particular user is an issue in biometric data i.e. the face reorganization data for a famous and important people. Therefore, this paper proposed biometric encryption to improve the confidentiality in Cloud computing for biometric data. Also, this paper discussed virtualization for Cloud computing, as well as biometrics encryption. Indeed, this paper overviewed the security weaknesses of Cloud computing and how biometric encryption can improve the confidentiality in Cloud computing environment. Apart from this, confidentiality is enhanced in Cloud computing by using biometric encryption for biometric data. The novel approach of biometric encryption is to enhance the biometric data confidentiality in Cloud computing.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"8 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116862508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security evaluation over lightweight cryptographic protocols","authors":"S. Ghoreishi, S. Razak, I. Isnin, Hassan Chizari","doi":"10.1109/ISBAST.2014.7013116","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013116","url":null,"abstract":"Due to the applicability of a wide range of cryptosystems in recently proposed applications, a large variety of cryptographic schemes have been developed. It can be claimed that proposing a cryptographic protocol to satisfy security and efficiency requirements is one of the significant challenging issues. Nevertheless, cryptographic research community suffers from non-existence of an integrated pattern to categorize and standardize possible challenges of mentioned concerns. These drawbacks could in turn lead to much confusion for the researchers who are not expert in this research area. Therefore, we paid particular attention to assemble a powerful document to fill this gap between the beginners and the experts. Our final goal is to make other researchers able to classify the challenges over Provably Secure cryptosystems or lightweight ones, analyze the proposed scheme based on the determined components and help them to find better solutions for the future researches.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130203863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}