2010 Fifth International Conference on Internet Monitoring and Protection最新文献

筛选
英文 中文
Risk Management for Web and Distributed Software Development Projects 网络和分布式软件开发项目的风险管理
2010 Fifth International Conference on Internet Monitoring and Protection Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.12
A. A. Keshlaf, S. Riddle
{"title":"Risk Management for Web and Distributed Software Development Projects","authors":"A. A. Keshlaf, S. Riddle","doi":"10.1109/ICIMP.2010.12","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.12","url":null,"abstract":"The level of complexity and risks associated with software have been increasing in line with the growth of the software industry. Modern software development, with an emphasis on web and distributed development, presents specific challenges and risk areas to the software industry which need to be considered and managed. In this paper we survey a number of software risk management approaches and identify weaknesses such as the treatment of culture issues, geographical location, and process and product perspectives. These weaknesses must be tackled in order to accommodate the continuously evolving challenges to web and distributed software development and to cover some perspectives of the software industry which have not been well covered up to now. This work is a part of PhD research at Newcastle University (UK) to develop an improved approach to measure and control web and distributed development risks.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126012727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
GoldPhish: Using Images for Content-Based Phishing Analysis GoldPhish:使用图像进行基于内容的网络钓鱼分析
2010 Fifth International Conference on Internet Monitoring and Protection Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.24
M. Dunlop, S. Groat, David Shelly
{"title":"GoldPhish: Using Images for Content-Based Phishing Analysis","authors":"M. Dunlop, S. Groat, David Shelly","doi":"10.1109/ICIMP.2010.24","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.24","url":null,"abstract":"Phishing attacks continue to plague users as attackers develop new ways to fool users into submitting personal information to fraudulent sites. Many schemes claim to protect against phishing sites. Unfortunately, most do not protect against zero-day phishing sites. Those schemes that do allege to provide zero-day protection, often incorrectly label both phishing and legitimate sites. We propose a scheme that protects against zero-day phishing attacks with high accuracy. Our approach captures an image of a page, uses optical character recognition to convert the image to text, then leverages the Google PageRank algorithm to help render a decision on the validity of the site. After testing our tool on 100 legitimate sites and 100 phishing sites, we accurately reported 100% of legitimate sites and 98% of phishing sites.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115398511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 156
Observations of UDP to TCP Ratio and Port Numbers 观察UDP到TCP的比率和端口号
2010 Fifth International Conference on Internet Monitoring and Protection Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.20
DongJin Lee, B. Carpenter, N. Brownlee
{"title":"Observations of UDP to TCP Ratio and Port Numbers","authors":"DongJin Lee, B. Carpenter, N. Brownlee","doi":"10.1109/ICIMP.2010.20","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.20","url":null,"abstract":"Widely used protocols (UDP and TCP) are observed for variations of the UDP to TCP ratio and of port number distribution, both over time and between different networks. The purpose of the study was to understand the impact of application trends, especially the growth in media streaming, on traffic characteristics. The results showed substantial variability but little sign of a systematic trend over time, and only wide spreads of port number usage.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123202592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
A Novel Method for Supporting Fairness in Digital License Reselling 一种支持数字许可转售公平性的新方法
2010 Fifth International Conference on Internet Monitoring and Protection Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.19
T. Gaber, Ning Zhang
{"title":"A Novel Method for Supporting Fairness in Digital License Reselling","authors":"T. Gaber, Ning Zhang","doi":"10.1109/ICIMP.2010.19","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.19","url":null,"abstract":"Current Digital Rights Management (DRM) systems permit a consumer to buy a digital license to access the corresponding content on his device. Under these current systems, however, the consumer is unable to resell the license.To allow the consumer to resell the license, all entities involved in the reselling process must be treated fairly. Fairness means that a reseller should obtain payment if and only if a buyer obtains the expected license and vice-versa. This paper presents a novel method to support fairness in reselling a digital license for DRM protected content. This method enables a reseller to fairly and securely exchange his/her license for payment from a buyer. In addition, it enables the reseller to maximize his profit and the buyer to minimize his cost in the same process.The method is designed such that the buyer can not cheat and the reseller has no incentive to do so. A practical mechanism is proposed to handle any misbehavior by the reseller. In comparison with related works, the method does not make use of any additional trusted hardware device, thus more cost-effective, while satisfying the interests of all the entities involved. The method also prevents reselling a non-resalable license and multiple reselling of the same license.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126326898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Authentication of Biometric Features Using Texture Coding for ID Cards 基于纹理编码的身份证生物特征认证
2010 Fifth International Conference on Internet Monitoring and Protection Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.29
J. Blackledge, E. Coyle
{"title":"Authentication of Biometric Features Using Texture Coding for ID Cards","authors":"J. Blackledge, E. Coyle","doi":"10.1109/ICIMP.2010.29","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.29","url":null,"abstract":"The use of image based information exchange has grown rapidly over the years in terms of both electronic-to-electronic image storage and transmission and in terms of maintaining paper documents in electronic form. Further, with the dramatic improvements in the quality of COTS (Commercial-Off-The-Shelf) printing and scanning devices, the ability to counterfeit electronic and printed documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking techniques which can be applied to both electronic and printed images (and documents) that can be authenticated, prevent unauthorized copying of their content and, in the case of printed documents, withstand abuse and degradation before and during scanning. In this paper we consider the background to a novel approach to solving this problem that has been developed into practically realisable system.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117163096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
BotDigger: A Fuzzy Inference System for Botnet Detection BotDigger:一个用于僵尸网络检测的模糊推理系统
2010 Fifth International Conference on Internet Monitoring and Protection Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.11
Basheer Al-Duwairi, L. Al-Ebbini
{"title":"BotDigger: A Fuzzy Inference System for Botnet Detection","authors":"Basheer Al-Duwairi, L. Al-Ebbini","doi":"10.1109/ICIMP.2010.11","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.11","url":null,"abstract":"This paper proposes BotDigger, a fuzzy logic-based botnet detection system. In this system, we derive a set of logical rules based on a well known botnet characteristics. Utilizing these rules, an adaptive logic algorithm will be applied on network traffic traces searching for botnet footprints and associating a trust level for each host present in the sampled data. Future work will focus on evaluating the proposed approach using real traffic traces.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"124 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129627201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
IDSAI: A Distributed System for Intrusion Detection Based on Intelligent Agents 基于智能代理的分布式入侵检测系统
2010 Fifth International Conference on Internet Monitoring and Protection Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.8
M. A. Sanz-Bobi, M. Castro, Javier Santos
{"title":"IDSAI: A Distributed System for Intrusion Detection Based on Intelligent Agents","authors":"M. A. Sanz-Bobi, M. Castro, Javier Santos","doi":"10.1109/ICIMP.2010.8","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.8","url":null,"abstract":"This paper describes an intelligent system for automatic detection of intrusions in computer networks. Its architecture is based on a multi-agent system in which several types of agents cooperate together to perform a fast and reliable detection of intrusions. Some agents are in charge of monitoring the traffic of the communication network using as core the well-known SNORT system fitted with different parameters for each monitoring agent. Other agents are responsible for the intelligent processing and interpretation of the information collected using knowledge rules. Finally, another type of agents is in charge of the compilation and integration of diagnoses issued by other agents and solving possible conflicts. The cooperation of all these agents will configure a more reliable and robust detection system than similar existing systems not using this type of architecture. This paper describes the IDSAI architecture, the agent roles and the main features of the application developed for network traffic surveillance.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128166523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Proposal of a Communication-Broadcasting Integrated System to Support Communication and Navigation during Disasters 一种支持灾害期间通信和导航的通信广播集成系统的方案
2010 Fifth International Conference on Internet Monitoring and Protection Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.22
Yasuhiko Hiehata, H. Koto, Hajime Nakamura
{"title":"A Proposal of a Communication-Broadcasting Integrated System to Support Communication and Navigation during Disasters","authors":"Yasuhiko Hiehata, H. Koto, Hajime Nakamura","doi":"10.1109/ICIMP.2010.22","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.22","url":null,"abstract":"Often, when a base transceiver station malfunctions, the users in its area cannot communicate. In this paper, we propose a communication support system that will guide users to available base transceiver stations in disasters such as earthquakes, reporting the status of available base transceiver stations as a data stream on digital TV. In addition, we propose a user navigation algorithm to deal with network congestion at the available base transceiver stations, and evaluate its validity with numerical simulation. Finally, we show an example of its implementation.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117263272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Evaluation of P4P Based on Real Traffic Measurement 基于真实流量测量的P4P评价
2010 Fifth International Conference on Internet Monitoring and Protection Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.25
Y. Carlinet, L. Mé, Y. Gourhant, Hervé Debar
{"title":"Evaluation of P4P Based on Real Traffic Measurement","authors":"Y. Carlinet, L. Mé, Y. Gourhant, Hervé Debar","doi":"10.1109/ICIMP.2010.25","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.25","url":null,"abstract":"Peer-To-Peer (P2P) traffic represents a significant proportion of the traffic today. However, currently widespread P2P systems take no account of the underlying network infrastructure. But by doing so, they would be able to perform a much more efficient peer selection. The P4P approach aims at allowing ISPs to cooperate with peers in order to improve their peer selection in the overlay. The objectives of this paper are to assess the benefits of P4P, both for the P2P system and the ISP, thanks to an experiment of a scale never achieved before, there by complementing the results obtained in previous work. The results show that P2P applications need more information than just the Internet domain, in order to improve their performance, and that the inter-domain P2P traffic can be reduced by at least 72%.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126642190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Risk-Aware Usage Decision Making in Highly Dynamic Systems 高动态系统中风险意识的使用决策
2010 Fifth International Conference on Internet Monitoring and Protection Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.13
Leanid Krautsevich, A. Lazouski, F. Martinelli, A. Yautsiukhin
{"title":"Risk-Aware Usage Decision Making in Highly Dynamic Systems","authors":"Leanid Krautsevich, A. Lazouski, F. Martinelli, A. Yautsiukhin","doi":"10.1109/ICIMP.2010.13","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.13","url":null,"abstract":"Usage control model (UCON) is based on the idea that attributes required for decision-making can be changed over a period of usage. Since it is not always possible to get a fresh and trustworthy value of attributes, a decision has to be done with some uncertainties in mind. Moreover, modern systems become more distributed and dynamic and this evolution aggravates the problem. Such trend demands for the solutions capable of working with imprecise values. Our study concerns analysis of risks to make access decision of usage control more credible. We consider the risks associated with imperfect mechanisms collecting information about an authorization context. To cope with these risks we introduce our approach based on Markov chains, which aims to help in making a decision to allow further access or to deny it. The proposed approach could be useful for designers of the policy enforcement engines based on the UCON model.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127334014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信