2014 International Symposium on Biometrics and Security Technologies (ISBAST)最新文献

筛选
英文 中文
A taxonomy on intrusion alert aggregation techniques 入侵警报聚合技术的分类
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013129
Taqwa Ahmed, M. M. Siraj, A. Zainal, M. Din
{"title":"A taxonomy on intrusion alert aggregation techniques","authors":"Taqwa Ahmed, M. M. Siraj, A. Zainal, M. Din","doi":"10.1109/ISBAST.2014.7013129","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013129","url":null,"abstract":"As security threats advance in a drastic way, most of the organizations apply various intrusion detection systems (IDSs) to optimize detection and to provide comprehensive view of intrusion activities. But IDS produces huge number of duplicated alerts information that overwhelm security operator. Alert aggregation addresses this issue by reducing, fusing and clustering the alerts. Techniques from a different scope of disciplines have been proposed by researchers for different aspects of aggregation. In this paper we present a comprehensive review on proposed alert aggregation techniques. Our main contribution is to classify the literature based on the techniques applied to aggregate the alerts.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125940274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparative analysis of skin color model for face detection 肤色模型在人脸检测中的比较分析
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013088
C. Sumathi, M. Mahadevi
{"title":"Comparative analysis of skin color model for face detection","authors":"C. Sumathi, M. Mahadevi","doi":"10.1109/ISBAST.2014.7013088","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013088","url":null,"abstract":"Skin color detection plays an important phase in identifying the face in images. Detecting face has become difficult because of the complexity in facial features and the similarity between those features. To identify a face, one of the basic step is to segment the image based on skin color. The main objective of the paper is to find a color model which is more suitable and shows a good performance in detecting a face. This paper compares each of the skin color models namely HSV, YCBCR, L*a*b for better accuracy. On such comparison, a hybrid skin color model is derived by combining the suitable color component from the three skin color models. After Morphological operations and using connected components a face is detected. After experiments it is observed that the Hybrid color model based skin detection is more suitable with an accuracy of 93%.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123637836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DNA approach for password conversion generator 密码转换生成器的DNA方法
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013114
Chng Chern Wei
{"title":"DNA approach for password conversion generator","authors":"Chng Chern Wei","doi":"10.1109/ISBAST.2014.7013114","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013114","url":null,"abstract":"The evolution of an information technology has been expended and growth rapidly since last decade, especially in the era of an internet web technology, such as, e-commence, ebusiness or e-payment or e-shopping and more. The evolution of an internet web technology has made the transmission of the data or information over the web is more comprehensive. Thus, the data or information is easy to hack, crack or spy by the unauthorized persons over the network. This paper proposed a technique of cryptography to make the data or information to be more secure during transmission over the internet technology based on the DNA Stenography with the Finite State Machine (Mealy Machine) theory. This proposed algorithm is able to securing the data or information at least 3 levels of combinations for the password conversion.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123724526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Face verification using Local Graph Stucture (LGS) 基于局部图结构的人脸验证
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013098
E. Abusham
{"title":"Face verification using Local Graph Stucture (LGS)","authors":"E. Abusham","doi":"10.1109/ISBAST.2014.7013098","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013098","url":null,"abstract":"Verification of human face plays an important role in social interaction, such as recognition and security. In this paper, a novel generative approach for face verification based on Local Graph Structure (LGS) description is proposed. A generic face model is considered as a collection of LGS-histograms. Local Graph Structure (LGS) operator is defined as a gray-scale invariant texture measure, derived from a general definition of texture in a local neighborhood. The histograms of the LGS were used for verification, various distance/similarity measures classifiers, namely, the Euclidian distance, the City block distance, the cosine similarity measure and the mahalanobis cosine. The experiments results on standard ORL face database images demonstrated the effectiveness of the proposed method.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126309946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A review of cloud security based on cryptographic mechanisms 基于加密机制的云安全综述
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013103
Sura Khalil Abd, S. Al-Haddad, F. Hashim, Azizol Abdullah
{"title":"A review of cloud security based on cryptographic mechanisms","authors":"Sura Khalil Abd, S. Al-Haddad, F. Hashim, Azizol Abdullah","doi":"10.1109/ISBAST.2014.7013103","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013103","url":null,"abstract":"Recently, computer users can maintain their data and applications on the Internet and in the central remote server by using a technology called cloud computing. It is a kind of technology that allows users to access their personal files from any device provided with Internet services such technology offers even more applications to be utilized without installation. This paper presents a review of basic security challenges consisting of traditional security issues. It also discusses the additional challenges that take place as a result of using cloud computing model by providers and users of cloud systems. Furthermore, solutions suggested by some researchers are presented with a focus on cryptographic techniques that approve secure cloud storage.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126320917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An enhanced certificateless cryptosystem for mobile ad hoc networks 一种用于移动自组织网络的增强的无证书密码系统
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013117
Shabnam Kasra Kermanshahi, M. Salleh
{"title":"An enhanced certificateless cryptosystem for mobile ad hoc networks","authors":"Shabnam Kasra Kermanshahi, M. Salleh","doi":"10.1109/ISBAST.2014.7013117","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013117","url":null,"abstract":"Due to the importance of security in many critical applications in MANETs and the limitation of the resources in mobile devices, it is important to have lightweight cryptosystems. Although some lightweight certificateless cryptosystems for MANETs have been proposed, it is possible to improve them in the term of reducing the complexity of the computations. In this paper, we have tried to propose a lightweight certificateless public key cryptographic scheme based on bilinear pairings. In addition, we compared our proposed scheme with other existing certificateless pairing based and result shows that the proposed scheme is more efficient based on computational cost and the rate of growth of computational expense viewpoints.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134387934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Distributed Denial of Service detection using hybrid machine learning technique 使用混合机器学习技术的分布式拒绝服务检测
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013133
M. Barati, Azizol Abdullah, N. Udzir, R. Mahmod, N. Mustapha
{"title":"Distributed Denial of Service detection using hybrid machine learning technique","authors":"M. Barati, Azizol Abdullah, N. Udzir, R. Mahmod, N. Mustapha","doi":"10.1109/ISBAST.2014.7013133","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013133","url":null,"abstract":"Distributed Denial of Service (DDoS) is a major threat among many security issues. To overcome this problem, many studies have been carried out by researchers, however due to inefficiency of their techniques in terms of accuracy and computational cost, proposing an efficient method to detect DDoS attack is still a hot topic in research. Current paper proposes architecture of a detection system for DDoS attack. Genetic Algorithm (GA) and Artificial Neural Network (ANN) are deployed for feature selection and attack detection respectively in our hybrid method. Wrapper method using GA is deployed to select the most efficient features and then DDoS attack detection rate is improved by applying Multi-Layer Perceptron (MLP) of ANN. Results demonstrate that the proposed method is able to detect DDoS attack with high accuracy and deniable False Alarm.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114785031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Face recognition for security efficiency in managing and monitoring visitors of an organization 人脸识别在管理和监控一个组织的访客安全效率
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013101
B. Satari, Nor Azlina Abd Rahman, Zety Marlia Zainal Abidin
{"title":"Face recognition for security efficiency in managing and monitoring visitors of an organization","authors":"B. Satari, Nor Azlina Abd Rahman, Zety Marlia Zainal Abidin","doi":"10.1109/ISBAST.2014.7013101","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013101","url":null,"abstract":"This paper discussing on a system that able to manage and monitor the visitors of an organization using face recognition as an authentication method. After the authentication and verification process, valid visitor will be printed with visitor card that will print out the face image of the visitor, date and time of visiting and the name of the person to be visited. Face recognition visitors management system (FRVMS) is proposed to enhance the security of an organization from outsiders that entering the building illegally for certain purposes such as spying or stealing the organization assets. Centralize system enable managing and monitoring process become more efficient. Cost of development is also taking into consideration as this system is not requiring any extra devices. Face recognition is using web camera that is already embedded with the computer. Several similar systems and technologies were reviewed and analyzed before designing the system. A system framework was proposed and prototype was developed. System advantages are highlighted but the main advantages of this system are to enhance the security and cutting cost of system development.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116290482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Biometric encryption to enhance confidentiality in Cloud computing 生物特征加密增强云计算的保密性
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013092
Malek Najib Omar, M. Salleh, M. Bakhtiari
{"title":"Biometric encryption to enhance confidentiality in Cloud computing","authors":"Malek Najib Omar, M. Salleh, M. Bakhtiari","doi":"10.1109/ISBAST.2014.7013092","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013092","url":null,"abstract":"Virtualization technology is the base technology used in Cloud computing. Therefore, virtualization enables Cloud computing to provide hardware and software services to the users on demand. Actually, many companies migrates to the Cloud computing for many reasons such as capabilities of processor, bus speed, size of storage, memory and managed to reduce the cost of dedicated servers. However, virtualization and Cloud computing contain many security weaknesses that affects the biometric data confidentiality in the Cloud computing. Those security issues are VM ware escape, hopping, mobility, diversity monitoring and etc. Furthermore, the privacy of a particular user is an issue in biometric data i.e. the face reorganization data for a famous and important people. Therefore, this paper proposed biometric encryption to improve the confidentiality in Cloud computing for biometric data. Also, this paper discussed virtualization for Cloud computing, as well as biometrics encryption. Indeed, this paper overviewed the security weaknesses of Cloud computing and how biometric encryption can improve the confidentiality in Cloud computing environment. Apart from this, confidentiality is enhanced in Cloud computing by using biometric encryption for biometric data. The novel approach of biometric encryption is to enhance the biometric data confidentiality in Cloud computing.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"8 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116862508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Security evaluation over lightweight cryptographic protocols 轻量级加密协议的安全性评估
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013116
S. Ghoreishi, S. Razak, I. Isnin, Hassan Chizari
{"title":"Security evaluation over lightweight cryptographic protocols","authors":"S. Ghoreishi, S. Razak, I. Isnin, Hassan Chizari","doi":"10.1109/ISBAST.2014.7013116","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013116","url":null,"abstract":"Due to the applicability of a wide range of cryptosystems in recently proposed applications, a large variety of cryptographic schemes have been developed. It can be claimed that proposing a cryptographic protocol to satisfy security and efficiency requirements is one of the significant challenging issues. Nevertheless, cryptographic research community suffers from non-existence of an integrated pattern to categorize and standardize possible challenges of mentioned concerns. These drawbacks could in turn lead to much confusion for the researchers who are not expert in this research area. Therefore, we paid particular attention to assemble a powerful document to fill this gap between the beginners and the experts. Our final goal is to make other researchers able to classify the challenges over Provably Secure cryptosystems or lightweight ones, analyze the proposed scheme based on the determined components and help them to find better solutions for the future researches.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130203863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信