{"title":"Risk Management for Web and Distributed Software Development Projects","authors":"A. A. Keshlaf, S. Riddle","doi":"10.1109/ICIMP.2010.12","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.12","url":null,"abstract":"The level of complexity and risks associated with software have been increasing in line with the growth of the software industry. Modern software development, with an emphasis on web and distributed development, presents specific challenges and risk areas to the software industry which need to be considered and managed. In this paper we survey a number of software risk management approaches and identify weaknesses such as the treatment of culture issues, geographical location, and process and product perspectives. These weaknesses must be tackled in order to accommodate the continuously evolving challenges to web and distributed software development and to cover some perspectives of the software industry which have not been well covered up to now. This work is a part of PhD research at Newcastle University (UK) to develop an improved approach to measure and control web and distributed development risks.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126012727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GoldPhish: Using Images for Content-Based Phishing Analysis","authors":"M. Dunlop, S. Groat, David Shelly","doi":"10.1109/ICIMP.2010.24","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.24","url":null,"abstract":"Phishing attacks continue to plague users as attackers develop new ways to fool users into submitting personal information to fraudulent sites. Many schemes claim to protect against phishing sites. Unfortunately, most do not protect against zero-day phishing sites. Those schemes that do allege to provide zero-day protection, often incorrectly label both phishing and legitimate sites. We propose a scheme that protects against zero-day phishing attacks with high accuracy. Our approach captures an image of a page, uses optical character recognition to convert the image to text, then leverages the Google PageRank algorithm to help render a decision on the validity of the site. After testing our tool on 100 legitimate sites and 100 phishing sites, we accurately reported 100% of legitimate sites and 98% of phishing sites.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115398511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Observations of UDP to TCP Ratio and Port Numbers","authors":"DongJin Lee, B. Carpenter, N. Brownlee","doi":"10.1109/ICIMP.2010.20","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.20","url":null,"abstract":"Widely used protocols (UDP and TCP) are observed for variations of the UDP to TCP ratio and of port number distribution, both over time and between different networks. The purpose of the study was to understand the impact of application trends, especially the growth in media streaming, on traffic characteristics. The results showed substantial variability but little sign of a systematic trend over time, and only wide spreads of port number usage.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123202592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Method for Supporting Fairness in Digital License Reselling","authors":"T. Gaber, Ning Zhang","doi":"10.1109/ICIMP.2010.19","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.19","url":null,"abstract":"Current Digital Rights Management (DRM) systems permit a consumer to buy a digital license to access the corresponding content on his device. Under these current systems, however, the consumer is unable to resell the license.To allow the consumer to resell the license, all entities involved in the reselling process must be treated fairly. Fairness means that a reseller should obtain payment if and only if a buyer obtains the expected license and vice-versa. This paper presents a novel method to support fairness in reselling a digital license for DRM protected content. This method enables a reseller to fairly and securely exchange his/her license for payment from a buyer. In addition, it enables the reseller to maximize his profit and the buyer to minimize his cost in the same process.The method is designed such that the buyer can not cheat and the reseller has no incentive to do so. A practical mechanism is proposed to handle any misbehavior by the reseller. In comparison with related works, the method does not make use of any additional trusted hardware device, thus more cost-effective, while satisfying the interests of all the entities involved. The method also prevents reselling a non-resalable license and multiple reselling of the same license.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126326898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authentication of Biometric Features Using Texture Coding for ID Cards","authors":"J. Blackledge, E. Coyle","doi":"10.1109/ICIMP.2010.29","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.29","url":null,"abstract":"The use of image based information exchange has grown rapidly over the years in terms of both electronic-to-electronic image storage and transmission and in terms of maintaining paper documents in electronic form. Further, with the dramatic improvements in the quality of COTS (Commercial-Off-The-Shelf) printing and scanning devices, the ability to counterfeit electronic and printed documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking techniques which can be applied to both electronic and printed images (and documents) that can be authenticated, prevent unauthorized copying of their content and, in the case of printed documents, withstand abuse and degradation before and during scanning. In this paper we consider the background to a novel approach to solving this problem that has been developed into practically realisable system.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117163096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BotDigger: A Fuzzy Inference System for Botnet Detection","authors":"Basheer Al-Duwairi, L. Al-Ebbini","doi":"10.1109/ICIMP.2010.11","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.11","url":null,"abstract":"This paper proposes BotDigger, a fuzzy logic-based botnet detection system. In this system, we derive a set of logical rules based on a well known botnet characteristics. Utilizing these rules, an adaptive logic algorithm will be applied on network traffic traces searching for botnet footprints and associating a trust level for each host present in the sampled data. Future work will focus on evaluating the proposed approach using real traffic traces.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"124 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129627201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IDSAI: A Distributed System for Intrusion Detection Based on Intelligent Agents","authors":"M. A. Sanz-Bobi, M. Castro, Javier Santos","doi":"10.1109/ICIMP.2010.8","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.8","url":null,"abstract":"This paper describes an intelligent system for automatic detection of intrusions in computer networks. Its architecture is based on a multi-agent system in which several types of agents cooperate together to perform a fast and reliable detection of intrusions. Some agents are in charge of monitoring the traffic of the communication network using as core the well-known SNORT system fitted with different parameters for each monitoring agent. Other agents are responsible for the intelligent processing and interpretation of the information collected using knowledge rules. Finally, another type of agents is in charge of the compilation and integration of diagnoses issued by other agents and solving possible conflicts. The cooperation of all these agents will configure a more reliable and robust detection system than similar existing systems not using this type of architecture. This paper describes the IDSAI architecture, the agent roles and the main features of the application developed for network traffic surveillance.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128166523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Proposal of a Communication-Broadcasting Integrated System to Support Communication and Navigation during Disasters","authors":"Yasuhiko Hiehata, H. Koto, Hajime Nakamura","doi":"10.1109/ICIMP.2010.22","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.22","url":null,"abstract":"Often, when a base transceiver station malfunctions, the users in its area cannot communicate. In this paper, we propose a communication support system that will guide users to available base transceiver stations in disasters such as earthquakes, reporting the status of available base transceiver stations as a data stream on digital TV. In addition, we propose a user navigation algorithm to deal with network congestion at the available base transceiver stations, and evaluate its validity with numerical simulation. Finally, we show an example of its implementation.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117263272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of P4P Based on Real Traffic Measurement","authors":"Y. Carlinet, L. Mé, Y. Gourhant, Hervé Debar","doi":"10.1109/ICIMP.2010.25","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.25","url":null,"abstract":"Peer-To-Peer (P2P) traffic represents a significant proportion of the traffic today. However, currently widespread P2P systems take no account of the underlying network infrastructure. But by doing so, they would be able to perform a much more efficient peer selection. The P4P approach aims at allowing ISPs to cooperate with peers in order to improve their peer selection in the overlay. The objectives of this paper are to assess the benefits of P4P, both for the P2P system and the ISP, thanks to an experiment of a scale never achieved before, there by complementing the results obtained in previous work. The results show that P2P applications need more information than just the Internet domain, in order to improve their performance, and that the inter-domain P2P traffic can be reduced by at least 72%.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126642190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Leanid Krautsevich, A. Lazouski, F. Martinelli, A. Yautsiukhin
{"title":"Risk-Aware Usage Decision Making in Highly Dynamic Systems","authors":"Leanid Krautsevich, A. Lazouski, F. Martinelli, A. Yautsiukhin","doi":"10.1109/ICIMP.2010.13","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.13","url":null,"abstract":"Usage control model (UCON) is based on the idea that attributes required for decision-making can be changed over a period of usage. Since it is not always possible to get a fresh and trustworthy value of attributes, a decision has to be done with some uncertainties in mind. Moreover, modern systems become more distributed and dynamic and this evolution aggravates the problem. Such trend demands for the solutions capable of working with imprecise values. Our study concerns analysis of risks to make access decision of usage control more credible. We consider the risks associated with imperfect mechanisms collecting information about an authorization context. To cope with these risks we introduce our approach based on Markov chains, which aims to help in making a decision to allow further access or to deny it. The proposed approach could be useful for designers of the policy enforcement engines based on the UCON model.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127334014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}