{"title":"A detection mechanism of DoS attack using adaptive NSA algorithm in cloud environment","authors":"Sumana Maiti, Chandan Garai, R. Dasgupta","doi":"10.1109/CCCS.2015.7374128","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374128","url":null,"abstract":"Security of any distributed system is not only complex in nature, it also needs much more attention as most of the applications being used and developed in recent past are on distributed platform. Denial of Service (DoS) attack causes drop in quality of service and may also reach to entire absence of service for some `real' users. Identifying some users as attackers also need appropriate algorithm. Negative selection algorithm (NSA) is a very effective approach in identifying some user as attacker. However declaring some `real' user as an attacker is a very common limitation of these types of algorithms unless and until the mechanism of detection is updated at regular intervals. In this research work we have modified NSA algorithm to take into account the necessity of updating the detector set from time to time. We have introduced a second detection module to accommodate the updation. Both the algorithms are implemented on common data set and comparative study is presented. Our proposed algorithm comes out with much improved results and significantly reduces false positive (false alarm) cases.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130433143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental performance comparison between TCP vs UDP tunnel using OpenVPN","authors":"Irfaan Coonjah, P. C. Catherine, M. S. Soyjaudah","doi":"10.1109/CCCS.2015.7374133","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374133","url":null,"abstract":"The comparison between TCP and UDP tunnels have not been sufficiently reported in the scientific literature. In this work, we use OpenVPN as a platform to demonstrate the performance between TCP/UDP. The de facto belief has been that TCP tunnel provides a permanent tunnel and therefore ensures a reliable transfer of data between two end points. However the effects of transmitting TCP within a UDP tunnel has been explored and could provide a valuable attempt. The results provided in this paper demonstrates that indeed TCP in UDP tunnel provides better latency. Throughout this paper, a series of tests have been performed, UDP traffic was sent inside UDP tunnel and TCP tunnel successively. The same tests was performed using TCP traffic.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132151252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physical layer secrecy solution for passive wireless sensor networks","authors":"Thombre Avinash Sarjerao, A. Trivedi","doi":"10.1109/CCCS.2015.7374120","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374120","url":null,"abstract":"The backscatter communication system has tremendous potential in commercial applications, still very less work has been done to study the benefits of it. Backscatter communication system is the backbone of many low cost and low power distributed wireless systems. The data transmission between various nodes in wireless communication system always comes with the risk of third party interception. This leads to privacy and security breaches of the information. In this paper, physical layer security of backscatter wireless system for multiple eavesdropper, single tag, and single reader case is studied. Unique characteristics of the channel are used to provide security to signal transmission. In order to degrade the reception of the signal by eavesdropper, a noise injection scheme is proposed. The advantages of this approach are discussed for various cases while evaluating the impact of the key factors like antenna gain and location of the eavesdropper on the secrecy of the transmission. Analytical results indicate that if properly employed, the noise injection scheme improves the performance of backscatter wireless system.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126483969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of IEEE 802.11n network Access Categories in EDCA non-saturated networks","authors":"P. Sotenga, P. Chuku, T. Olwal","doi":"10.1109/CCCS.2015.7374188","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374188","url":null,"abstract":"In recent years demand for high data rate amongst internet users has increased due to the use of real time data services such as video and voice conferencing. The IEEE 802.11n standard is an advancement from the previous a,b and g versions. Its design goal is to increase data rate, and maintain compatibility with the previous versions. The IEEE 802.11n standard introduces improvements at both the PHY and MAC layers. This standard still adopts the EDCA and HCCA mechanism used for enhancing QoS in the network by assigning priorities to different classes of data called Access Categories (ACs). In this paper we compute a theoretical throughput model for 4 different stations transmitting separate ACs in non saturated conditions. Networks with non saturated conditions find real applications in WSN and WiFi enterprises. We then perform a practical experimentation with 4 different nodes and compare the throughput results with the theoretical one. Based on the comparison, we determine the fairness linked with the QoS mechanism. The comparative throughput performance indicates that the analytical results compare well with the practical experimental results considering non saturated ACs.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133395858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rajeshree Ramjug-Ballgobin, H. C. S. Rugooputh, K. Busawon, R. Binns
{"title":"Observer-based control for biomass regulation in wastewater treatment plants","authors":"Rajeshree Ramjug-Ballgobin, H. C. S. Rugooputh, K. Busawon, R. Binns","doi":"10.1109/CCCS.2015.7374173","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374173","url":null,"abstract":"In this paper, an estimation and control design methodology for biomass concentration in bioreactors is presented. For this, a feedback linearising control was designed to perform biomass regulation. Since the controller depends on the measurements of the biomass concentration, an observer was designed to estimate the latter. After that, an observer and an observer-based controller were applied to the system. Simulation study showed the good convergence features of the proposed observer-based controller using Matlab/Simulink.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134590285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"6to4 tunneling framework using OpenSSH","authors":"Irfaan Coonjah, P. C. Catherine, K. Soyjaudah","doi":"10.1109/CCCS.2015.7374134","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374134","url":null,"abstract":"6to4 tunneling enables IPv6 hosts and routers to connect with other IPv6 hosts and routers over the existing IPv4Internet. The main purpose of IPv6 tunneling is to maintain compatibility with large existing base of IPv4 hosts and routers. OpenSSH VPN tunneling is said to have limitations with numerous IPv6 clients and therefore it is advisable to use OpenVPN. To the best knowledge of the authors, this is the first reported successful implementation of 6to4 tunneling over OpenSSH with more than one client. This proof-of-concept positions OpenSSH therefore as a potential alternative to conventional VPNs.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130277231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving user cognitive processes in mobile learning platforms through context-awareness","authors":"Brita Curum, K. Khedo","doi":"10.1109/CCCS.2015.7374137","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374137","url":null,"abstract":"The use of mobile devices for learning is prominent nowadays. Mobile learning has become an essential part to enhance today's learning style. However, technologies still lack abilities to fully understand human reaction and comprehend their cognitive processes to be able to interact with them and deliver the right amount of contents. Therefore, one research scope is having devices which can sense and acknowledge user context information according to the individual's cognitive load. The purpose is to seriously engage a learner with learning materials with an appropriate speed of information flow, within the mobile device without constraints of time, locations, and device restrictions. In this paper, a detailed evaluation of context-aware mechanisms to improve cognitive load of users in mobile learning platforms is carried out. Different evaluation criteria are identified and discussed followed with a detailed assessment on the recent existing works of context-aware algorithms. Identified open challenges and research directions for using context-aware information to improve mobile learning are presented.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129581342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of matrix- and EXIF-based video rotation methods in MJPEG-based live video encoder","authors":"D. Škvorc, Mirela Oštrek, M. Horvat","doi":"10.1109/CCCS.2015.7374142","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374142","url":null,"abstract":"Contemporary camera-equipped wearable devices, such as smartphones and tablets, are now powerful enough to be used as ubiquitous remote sources of live video streams. However, as these devices may operate in various positions, including upside down or rotated, encoding the captured video into a data format suitable for live streaming also includes the rotation of video frames to compensate the device rotation effect. In this paper, we analyze the impact of the video rotation procedures to the frame rate of the produced live video. MJPEG is used as a video encoding format. We compare the performance of two video rotation methods: classical pixel-level rotation based on rotation matrix and JPEG tagging using EXIF metadata. The results show that EXIF-based tagging outperforms matrix-based calculations significantly, and gets superior as video resolution increases. However, since EXIF metadata are not yet widely supported in modern web browsers, if compatibility with open user community is required, matrix-based rotation is the option to go with.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133608001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An analysis of the suitability of cloud computing services in the Nigerian Education Landscape","authors":"S. Misra, A. Adewumi","doi":"10.1109/CCCS.2015.7374203","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374203","url":null,"abstract":"Cloud computing is fast gaining popularity in educational institutions of developing countries like Nigeria. Software as a Service, Platform as a Service and Infrastructure as a Service are the three key models through which cloud computing services are delivered to end-users. A number of studies have been conducted to identify the enabling factors as well as the issues being faced as regards the adoption of cloud computing in the Nigerian context. In this study however, Strength, Weakness, Opportunity and Threat analysis of the service delivery models in the Nigerian Education landscape has been presented. In addition, the issues that an educational institution needs to consider when adopting cloud computing is discussed.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132735999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"First principle leakage current reduction technique for CMOS devices","authors":"H. D. Tsague, Bhekisipho Twala","doi":"10.1109/CCCS.2015.7374165","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374165","url":null,"abstract":"This paper presents a comprehensive study of leakage reduction techniques applicable to CMOS based devices. In the process, mathematical equations that model the power-performance trade-offs in CMOS logic circuits are presented. From those equations, suitable techniques for leakage reduction as pertaining to CMOS devices are deduced. Throughout this research it became evident that designing CMOS devices with high-κ dielectrics is a viable method for reducing leakages in cryptographic devices. To support our claim, a 22nm NMOS device was built and simulated in Athena software from Silvaco. The electrical characteristics of the fabricated device were extracted using the Atlas component of the simulator. From this research, it became evident that high-κ dielectric metal gate are capable of providing a reliable resistance to DPA and other form of attacks on cryptographic platforms such as smart card.The fabricated device showed a marked improvement on the Ion/Ioff ratio, where the higher ratio means that the device is suitable for low power applications. Physical models used for simulation included SI3N4 and HfO2 as gate dielectric with TiSix as metal gate. From the simulation result, it was shown that HfO2 was the best dielectric material when TiSix is used as the metal gate.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133576958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}