{"title":"ICITST Programme Committees","authors":"","doi":"10.23919/icitst51030.2020.9351332","DOIUrl":"https://doi.org/10.23919/icitst51030.2020.9351332","url":null,"abstract":"","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128025864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implement a Model for Describing and Maximising Security Knowledge Sharing","authors":"S. Al-Ahmari, K. Renaud, Inah Omoronyia","doi":"10.23919/ICITST51030.2020.9351318","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351318","url":null,"abstract":"Employees play a crucial role in improving information security in their enterprise, and this requires everyone having the requisite security knowledge. To maximise knowledge, organisations should facilitate and encourage Security Knowledge Sharing (SKS) between employees. This paper reports on the design and implementation of a mobile game to enhance the delivery of information security training to help employees to protect themselves against security attacks. The collaborative Transactive Memory System (TMS) theory was used to model organisational knowledge sharing. We then satisfy the self-determination needs of employees to maximise intrinsic motivation to share knowledge at the individual level, via an Educational Security Game. An empirical study evaluated the intervention, an application that facilitates and encourages Information Security Knowledge Sharing. The results are still in progress.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126958369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Parking With Automated Billing System","authors":"Dhruva Hunusekattte","doi":"10.23919/ICITST51030.2020.9351312","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351312","url":null,"abstract":"In this paper, aptly named as ‘Smart Parking with Automated Billing System’, a system is proposed with least human intervention to achieve an efficient billing system for a parking lot. By managing an efficient and automated billing system, the waiting time of each user is reduced, and thereby allowing the user to have a seamless and hassle-free experience. It also helps in lowering the amount of daily vehicle emissions by reducing the waiting period. This system is implemented on an ARM CORTEX M3 Board which has a low power consumption and functions in real time connected with an ESP-8266, MySQL (an open source database management system), RFID tags, a reader module and a GSM module for mobile communication.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124359567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monitoring IoT Encrypted Traffic with Deep Packet Inspection and Statistical Analysis","authors":"L. Deri, Daniele Sartiano","doi":"10.23919/ICITST51030.2020.9351330","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351330","url":null,"abstract":"The pervasive use of encrypted protocols and new communication paradigms based on mobile and home IoT devices has obsoleted traffic analysis techniques that relied on clear text analysis. This has required new monitoring metrics being able to characterise, identify, and classify traffic not just in terms of network protocols but also behaviour and intended use. This paper reports the lessons learnt while analysing traffic in both home networks and the Internet, and it describes how monitoring metrics used in experiments have been implemented in an open source toolkit for deep packet inspection and traffic analysis. The validation process confirmed that combining the proposed metrics with deep packet inspection, it is possible to effectively characterise and fingerprint encrypted traffic generated by home IoT and non-IoT devices.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123687577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TL-NID: Deep Neural Network with Transfer Learning for Network Intrusion Detection","authors":"Mohammad Masum, H. Shahriar","doi":"10.23919/ICITST51030.2020.9351317","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351317","url":null,"abstract":"Network intrusion detection systems (NIDSs) play an essential role in the defense of computer networks by identifying a computer networks' unauthorized access and investigating potential security breaches. Traditional NIDSs encounters difficulties to combat newly created sophisticated and unpredictable security attacks. Hence, there is an increasing need for automatic intrusion detection solution that can detect malicious activities more accurately and prevent high false alarm rates (FPR). In this paper, we propose a novel network intrusion detection framework using a deep neural network based on the pretrained VGG-16 architecture. The framework, TL-NID (Transfer Learning for Network Intrusion Detection), is a two-step process where features are extracted in the first step, using VGG-16 pre-trained on ImageNet dataset and in the 2ndstep a deep neural network is applied to the extracted features for classification. We applied TL-NID on NSL-KDD, a benchmark dataset for network intrusion, to evaluate the performance of the proposed framework. The experimental results show that our proposed method can effectively learn from the NSL-KDD dataset with producing a realistic performance in terms of accuracy, precision, recall, and false alarm. This study also aims to motivate security researchers to exploit different state-of-the-art pre-trained models for network intrusion detection problems through valuable knowledge transfer.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117142094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session 2: Information Security","authors":"","doi":"10.23919/icitst51030.2020.9351336","DOIUrl":"https://doi.org/10.23919/icitst51030.2020.9351336","url":null,"abstract":"","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115788094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review of the Current Cyber Hygiene in Small and Medium-sized Businesses","authors":"T. Ncubukezi, L. Mwansa, F. Rocaries","doi":"10.23919/ICITST51030.2020.9351339","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351339","url":null,"abstract":"The Internet's increased convenient usage has equally granted access to cyber hackers, which quantified cybercrimes. Small and medium-sized businesses (SMB) have become victims of cybercrimes and have negatively affected SMBs' cyber hygiene. The continual practice of good cyber hygiene improves and balances the health of business assets such as hardware devices, people, and software applications. To this end, the level of the hygiene of cybersecurity in the SMBs is still not clear. The paper reports the current cyber health status in SMBs. Our work also examines cyber threats experienced by SMBs, reviewing the use of relevant security measures and their extent of the implementation to maintain good cyber hygiene. The study selected 30 SMB participants in the Western Cape (WC) province, South Africa using purposive sampling. The work used an open-ended online qualitative survey and interviews as the data-collection methods. The collected evidence was analyzed using narrative analysis. The findings revealed that cybersecurity hygiene in SMBs varies from one business sector to the other. The absence of detailed rules, standards, procedures, and guidelines to promote good cybersecurity hygiene leads to poor cyber hygiene in SMBs. Results further showed the limitations of the use of current security measures and their practice. Also, SMBs' employees have minimal knowledge about handling cyber-attacks, thus resulting in significant shortcomings. The study recommended the best ways to maintain good cyber hygiene.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116934735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chunxiao Yang, I. Taralova, J. Loiseau, S. E. Assad
{"title":"A Stream Cipher Based on Fractional Pseudo Chaotic Random Number Generator","authors":"Chunxiao Yang, I. Taralova, J. Loiseau, S. E. Assad","doi":"10.23919/ICITST51030.2020.9351350","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351350","url":null,"abstract":"In this paper, we focus on the design of fractional pseudo-chaotic random number generator (FPCRNG) based on the coupling of fractional chaotic systems. The proposed FPCRNG is composed of 3 fractional chaotic systems, including one fractional generalized double-humped logistic system, two 3D fractional systems Chen's system and Lu's system, and one classical skew-tent map. A non-uniform grid calculation method is employed by introducing the skew-tent map into the numerical calculation of the states of the Chen's system and Lu's system to obtain greater chaoticity in terms of Lyapunov exponent. The XOR (exclusive-or) operations are applied to the fractional systems to obtain the final pseudo-chaotic outputs. The security analysis and statistical experiment of a stream cipher implementing the FPCRNG prove that the proposed structure is effective and can be used in the cryptosystem.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"854 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127957556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zein Ashi, Laila Aburashed, Mohammad Al-Fawa'reh, Malik Qasaimeh
{"title":"Fast and Reliable DDoS Detection using Dimensionality Reduction and Machine Learning","authors":"Zein Ashi, Laila Aburashed, Mohammad Al-Fawa'reh, Malik Qasaimeh","doi":"10.23919/ICITST51030.2020.9351347","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351347","url":null,"abstract":"Distributed Denial of Service (DDoS) Attack poses a rising threat on cloud computing systems in which the attacker exploits machines from outside and inside the cloud system to initiate the attack against. To prevent DDoS attack, real-time analysis of the cloud network traffic is fundamental. Machine learning techniques are an effective solution to develop a robust Intrusion detection system in cloud computing systems. This paper proposed a machine learning framework, explores the possibility of utilizing a machine learning classifier to detect the DDoS attack on cloud computing systems; first by the full dimensions of the features, second by reducing these dimensions. Our framework is characterized by a high accurate rate in detecting emerging DDoS attacks, and its lightweight algorithm.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128131533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session 1: Cyber Security","authors":"","doi":"10.23919/icitst51030.2020.9351334","DOIUrl":"https://doi.org/10.23919/icitst51030.2020.9351334","url":null,"abstract":"","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133050355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}