2015 International Conference on Computing, Communication and Security (ICCCS)最新文献

筛选
英文 中文
A detection mechanism of DoS attack using adaptive NSA algorithm in cloud environment 一种基于自适应NSA算法的云环境下DoS攻击检测机制
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374128
Sumana Maiti, Chandan Garai, R. Dasgupta
{"title":"A detection mechanism of DoS attack using adaptive NSA algorithm in cloud environment","authors":"Sumana Maiti, Chandan Garai, R. Dasgupta","doi":"10.1109/CCCS.2015.7374128","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374128","url":null,"abstract":"Security of any distributed system is not only complex in nature, it also needs much more attention as most of the applications being used and developed in recent past are on distributed platform. Denial of Service (DoS) attack causes drop in quality of service and may also reach to entire absence of service for some `real' users. Identifying some users as attackers also need appropriate algorithm. Negative selection algorithm (NSA) is a very effective approach in identifying some user as attacker. However declaring some `real' user as an attacker is a very common limitation of these types of algorithms unless and until the mechanism of detection is updated at regular intervals. In this research work we have modified NSA algorithm to take into account the necessity of updating the detector set from time to time. We have introduced a second detection module to accommodate the updation. Both the algorithms are implemented on common data set and comparative study is presented. Our proposed algorithm comes out with much improved results and significantly reduces false positive (false alarm) cases.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130433143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Experimental performance comparison between TCP vs UDP tunnel using OpenVPN 使用OpenVPN的TCP和UDP隧道的实验性能比较
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374133
Irfaan Coonjah, P. C. Catherine, M. S. Soyjaudah
{"title":"Experimental performance comparison between TCP vs UDP tunnel using OpenVPN","authors":"Irfaan Coonjah, P. C. Catherine, M. S. Soyjaudah","doi":"10.1109/CCCS.2015.7374133","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374133","url":null,"abstract":"The comparison between TCP and UDP tunnels have not been sufficiently reported in the scientific literature. In this work, we use OpenVPN as a platform to demonstrate the performance between TCP/UDP. The de facto belief has been that TCP tunnel provides a permanent tunnel and therefore ensures a reliable transfer of data between two end points. However the effects of transmitting TCP within a UDP tunnel has been explored and could provide a valuable attempt. The results provided in this paper demonstrates that indeed TCP in UDP tunnel provides better latency. Throughout this paper, a series of tests have been performed, UDP traffic was sent inside UDP tunnel and TCP tunnel successively. The same tests was performed using TCP traffic.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132151252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Physical layer secrecy solution for passive wireless sensor networks 无源无线传感器网络物理层保密解决方案
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374120
Thombre Avinash Sarjerao, A. Trivedi
{"title":"Physical layer secrecy solution for passive wireless sensor networks","authors":"Thombre Avinash Sarjerao, A. Trivedi","doi":"10.1109/CCCS.2015.7374120","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374120","url":null,"abstract":"The backscatter communication system has tremendous potential in commercial applications, still very less work has been done to study the benefits of it. Backscatter communication system is the backbone of many low cost and low power distributed wireless systems. The data transmission between various nodes in wireless communication system always comes with the risk of third party interception. This leads to privacy and security breaches of the information. In this paper, physical layer security of backscatter wireless system for multiple eavesdropper, single tag, and single reader case is studied. Unique characteristics of the channel are used to provide security to signal transmission. In order to degrade the reception of the signal by eavesdropper, a noise injection scheme is proposed. The advantages of this approach are discussed for various cases while evaluating the impact of the key factors like antenna gain and location of the eavesdropper on the secrecy of the transmission. Analytical results indicate that if properly employed, the noise injection scheme improves the performance of backscatter wireless system.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126483969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of IEEE 802.11n network Access Categories in EDCA non-saturated networks EDCA非饱和网络中IEEE 802.11n网络接入类别分析
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374188
P. Sotenga, P. Chuku, T. Olwal
{"title":"Analysis of IEEE 802.11n network Access Categories in EDCA non-saturated networks","authors":"P. Sotenga, P. Chuku, T. Olwal","doi":"10.1109/CCCS.2015.7374188","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374188","url":null,"abstract":"In recent years demand for high data rate amongst internet users has increased due to the use of real time data services such as video and voice conferencing. The IEEE 802.11n standard is an advancement from the previous a,b and g versions. Its design goal is to increase data rate, and maintain compatibility with the previous versions. The IEEE 802.11n standard introduces improvements at both the PHY and MAC layers. This standard still adopts the EDCA and HCCA mechanism used for enhancing QoS in the network by assigning priorities to different classes of data called Access Categories (ACs). In this paper we compute a theoretical throughput model for 4 different stations transmitting separate ACs in non saturated conditions. Networks with non saturated conditions find real applications in WSN and WiFi enterprises. We then perform a practical experimentation with 4 different nodes and compare the throughput results with the theoretical one. Based on the comparison, we determine the fairness linked with the QoS mechanism. The comparative throughput performance indicates that the analytical results compare well with the practical experimental results considering non saturated ACs.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133395858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Observer-based control for biomass regulation in wastewater treatment plants 基于观测器的污水处理厂生物质调控控制
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374173
Rajeshree Ramjug-Ballgobin, H. C. S. Rugooputh, K. Busawon, R. Binns
{"title":"Observer-based control for biomass regulation in wastewater treatment plants","authors":"Rajeshree Ramjug-Ballgobin, H. C. S. Rugooputh, K. Busawon, R. Binns","doi":"10.1109/CCCS.2015.7374173","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374173","url":null,"abstract":"In this paper, an estimation and control design methodology for biomass concentration in bioreactors is presented. For this, a feedback linearising control was designed to perform biomass regulation. Since the controller depends on the measurements of the biomass concentration, an observer was designed to estimate the latter. After that, an observer and an observer-based controller were applied to the system. Simulation study showed the good convergence features of the proposed observer-based controller using Matlab/Simulink.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134590285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
6to4 tunneling framework using OpenSSH 使用OpenSSH的6to4隧道框架
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374134
Irfaan Coonjah, P. C. Catherine, K. Soyjaudah
{"title":"6to4 tunneling framework using OpenSSH","authors":"Irfaan Coonjah, P. C. Catherine, K. Soyjaudah","doi":"10.1109/CCCS.2015.7374134","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374134","url":null,"abstract":"6to4 tunneling enables IPv6 hosts and routers to connect with other IPv6 hosts and routers over the existing IPv4Internet. The main purpose of IPv6 tunneling is to maintain compatibility with large existing base of IPv4 hosts and routers. OpenSSH VPN tunneling is said to have limitations with numerous IPv6 clients and therefore it is advisable to use OpenVPN. To the best knowledge of the authors, this is the first reported successful implementation of 6to4 tunneling over OpenSSH with more than one client. This proof-of-concept positions OpenSSH therefore as a potential alternative to conventional VPNs.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130277231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improving user cognitive processes in mobile learning platforms through context-awareness 通过情境感知改善移动学习平台中的用户认知过程
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374137
Brita Curum, K. Khedo
{"title":"Improving user cognitive processes in mobile learning platforms through context-awareness","authors":"Brita Curum, K. Khedo","doi":"10.1109/CCCS.2015.7374137","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374137","url":null,"abstract":"The use of mobile devices for learning is prominent nowadays. Mobile learning has become an essential part to enhance today's learning style. However, technologies still lack abilities to fully understand human reaction and comprehend their cognitive processes to be able to interact with them and deliver the right amount of contents. Therefore, one research scope is having devices which can sense and acknowledge user context information according to the individual's cognitive load. The purpose is to seriously engage a learner with learning materials with an appropriate speed of information flow, within the mobile device without constraints of time, locations, and device restrictions. In this paper, a detailed evaluation of context-aware mechanisms to improve cognitive load of users in mobile learning platforms is carried out. Different evaluation criteria are identified and discussed followed with a detailed assessment on the recent existing works of context-aware algorithms. Identified open challenges and research directions for using context-aware information to improve mobile learning are presented.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129581342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance evaluation of matrix- and EXIF-based video rotation methods in MJPEG-based live video encoder 基于矩阵和exif的视频旋转方法在mjpeg视频编码器中的性能评价
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374142
D. Škvorc, Mirela Oštrek, M. Horvat
{"title":"Performance evaluation of matrix- and EXIF-based video rotation methods in MJPEG-based live video encoder","authors":"D. Škvorc, Mirela Oštrek, M. Horvat","doi":"10.1109/CCCS.2015.7374142","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374142","url":null,"abstract":"Contemporary camera-equipped wearable devices, such as smartphones and tablets, are now powerful enough to be used as ubiquitous remote sources of live video streams. However, as these devices may operate in various positions, including upside down or rotated, encoding the captured video into a data format suitable for live streaming also includes the rotation of video frames to compensate the device rotation effect. In this paper, we analyze the impact of the video rotation procedures to the frame rate of the produced live video. MJPEG is used as a video encoding format. We compare the performance of two video rotation methods: classical pixel-level rotation based on rotation matrix and JPEG tagging using EXIF metadata. The results show that EXIF-based tagging outperforms matrix-based calculations significantly, and gets superior as video resolution increases. However, since EXIF metadata are not yet widely supported in modern web browsers, if compatibility with open user community is required, matrix-based rotation is the option to go with.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133608001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An analysis of the suitability of cloud computing services in the Nigerian Education Landscape 云计算服务在尼日利亚教育领域的适用性分析
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374203
S. Misra, A. Adewumi
{"title":"An analysis of the suitability of cloud computing services in the Nigerian Education Landscape","authors":"S. Misra, A. Adewumi","doi":"10.1109/CCCS.2015.7374203","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374203","url":null,"abstract":"Cloud computing is fast gaining popularity in educational institutions of developing countries like Nigeria. Software as a Service, Platform as a Service and Infrastructure as a Service are the three key models through which cloud computing services are delivered to end-users. A number of studies have been conducted to identify the enabling factors as well as the issues being faced as regards the adoption of cloud computing in the Nigerian context. In this study however, Strength, Weakness, Opportunity and Threat analysis of the service delivery models in the Nigerian Education landscape has been presented. In addition, the issues that an educational institution needs to consider when adopting cloud computing is discussed.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132735999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
First principle leakage current reduction technique for CMOS devices CMOS器件的第一原理漏电流减小技术
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374165
H. D. Tsague, Bhekisipho Twala
{"title":"First principle leakage current reduction technique for CMOS devices","authors":"H. D. Tsague, Bhekisipho Twala","doi":"10.1109/CCCS.2015.7374165","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374165","url":null,"abstract":"This paper presents a comprehensive study of leakage reduction techniques applicable to CMOS based devices. In the process, mathematical equations that model the power-performance trade-offs in CMOS logic circuits are presented. From those equations, suitable techniques for leakage reduction as pertaining to CMOS devices are deduced. Throughout this research it became evident that designing CMOS devices with high-κ dielectrics is a viable method for reducing leakages in cryptographic devices. To support our claim, a 22nm NMOS device was built and simulated in Athena software from Silvaco. The electrical characteristics of the fabricated device were extracted using the Atlas component of the simulator. From this research, it became evident that high-κ dielectric metal gate are capable of providing a reliable resistance to DPA and other form of attacks on cryptographic platforms such as smart card.The fabricated device showed a marked improvement on the Ion/Ioff ratio, where the higher ratio means that the device is suitable for low power applications. Physical models used for simulation included SI3N4 and HfO2 as gate dielectric with TiSix as metal gate. From the simulation result, it was shown that HfO2 was the best dielectric material when TiSix is used as the metal gate.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133576958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信