2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

筛选
英文 中文
ICITST Programme Committees 技术援助专员计划委员会
2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) Pub Date : 2020-12-08 DOI: 10.23919/icitst51030.2020.9351332
{"title":"ICITST Programme Committees","authors":"","doi":"10.23919/icitst51030.2020.9351332","DOIUrl":"https://doi.org/10.23919/icitst51030.2020.9351332","url":null,"abstract":"","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128025864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implement a Model for Describing and Maximising Security Knowledge Sharing 实现一个描述和最大化安全知识共享的模型
2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351318
S. Al-Ahmari, K. Renaud, Inah Omoronyia
{"title":"Implement a Model for Describing and Maximising Security Knowledge Sharing","authors":"S. Al-Ahmari, K. Renaud, Inah Omoronyia","doi":"10.23919/ICITST51030.2020.9351318","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351318","url":null,"abstract":"Employees play a crucial role in improving information security in their enterprise, and this requires everyone having the requisite security knowledge. To maximise knowledge, organisations should facilitate and encourage Security Knowledge Sharing (SKS) between employees. This paper reports on the design and implementation of a mobile game to enhance the delivery of information security training to help employees to protect themselves against security attacks. The collaborative Transactive Memory System (TMS) theory was used to model organisational knowledge sharing. We then satisfy the self-determination needs of employees to maximise intrinsic motivation to share knowledge at the individual level, via an Educational Security Game. An empirical study evaluated the intervention, an application that facilitates and encourages Information Security Knowledge Sharing. The results are still in progress.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126958369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart Parking With Automated Billing System 智能停车与自动计费系统
2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351312
Dhruva Hunusekattte
{"title":"Smart Parking With Automated Billing System","authors":"Dhruva Hunusekattte","doi":"10.23919/ICITST51030.2020.9351312","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351312","url":null,"abstract":"In this paper, aptly named as ‘Smart Parking with Automated Billing System’, a system is proposed with least human intervention to achieve an efficient billing system for a parking lot. By managing an efficient and automated billing system, the waiting time of each user is reduced, and thereby allowing the user to have a seamless and hassle-free experience. It also helps in lowering the amount of daily vehicle emissions by reducing the waiting period. This system is implemented on an ARM CORTEX M3 Board which has a low power consumption and functions in real time connected with an ESP-8266, MySQL (an open source database management system), RFID tags, a reader module and a GSM module for mobile communication.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124359567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Monitoring IoT Encrypted Traffic with Deep Packet Inspection and Statistical Analysis 利用深度包检测和统计分析监控物联网加密流量
2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351330
L. Deri, Daniele Sartiano
{"title":"Monitoring IoT Encrypted Traffic with Deep Packet Inspection and Statistical Analysis","authors":"L. Deri, Daniele Sartiano","doi":"10.23919/ICITST51030.2020.9351330","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351330","url":null,"abstract":"The pervasive use of encrypted protocols and new communication paradigms based on mobile and home IoT devices has obsoleted traffic analysis techniques that relied on clear text analysis. This has required new monitoring metrics being able to characterise, identify, and classify traffic not just in terms of network protocols but also behaviour and intended use. This paper reports the lessons learnt while analysing traffic in both home networks and the Internet, and it describes how monitoring metrics used in experiments have been implemented in an open source toolkit for deep packet inspection and traffic analysis. The validation process confirmed that combining the proposed metrics with deep packet inspection, it is possible to effectively characterise and fingerprint encrypted traffic generated by home IoT and non-IoT devices.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123687577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TL-NID: Deep Neural Network with Transfer Learning for Network Intrusion Detection 基于迁移学习的深度神经网络网络入侵检测
2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351317
Mohammad Masum, H. Shahriar
{"title":"TL-NID: Deep Neural Network with Transfer Learning for Network Intrusion Detection","authors":"Mohammad Masum, H. Shahriar","doi":"10.23919/ICITST51030.2020.9351317","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351317","url":null,"abstract":"Network intrusion detection systems (NIDSs) play an essential role in the defense of computer networks by identifying a computer networks' unauthorized access and investigating potential security breaches. Traditional NIDSs encounters difficulties to combat newly created sophisticated and unpredictable security attacks. Hence, there is an increasing need for automatic intrusion detection solution that can detect malicious activities more accurately and prevent high false alarm rates (FPR). In this paper, we propose a novel network intrusion detection framework using a deep neural network based on the pretrained VGG-16 architecture. The framework, TL-NID (Transfer Learning for Network Intrusion Detection), is a two-step process where features are extracted in the first step, using VGG-16 pre-trained on ImageNet dataset and in the 2ndstep a deep neural network is applied to the extracted features for classification. We applied TL-NID on NSL-KDD, a benchmark dataset for network intrusion, to evaluate the performance of the proposed framework. The experimental results show that our proposed method can effectively learn from the NSL-KDD dataset with producing a realistic performance in terms of accuracy, precision, recall, and false alarm. This study also aims to motivate security researchers to exploit different state-of-the-art pre-trained models for network intrusion detection problems through valuable knowledge transfer.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117142094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Session 2: Information Security 第二部分:信息安全
2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) Pub Date : 2020-12-08 DOI: 10.23919/icitst51030.2020.9351336
{"title":"Session 2: Information Security","authors":"","doi":"10.23919/icitst51030.2020.9351336","DOIUrl":"https://doi.org/10.23919/icitst51030.2020.9351336","url":null,"abstract":"","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115788094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review of the Current Cyber Hygiene in Small and Medium-sized Businesses 中小企业网络卫生现状述评
2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351339
T. Ncubukezi, L. Mwansa, F. Rocaries
{"title":"A Review of the Current Cyber Hygiene in Small and Medium-sized Businesses","authors":"T. Ncubukezi, L. Mwansa, F. Rocaries","doi":"10.23919/ICITST51030.2020.9351339","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351339","url":null,"abstract":"The Internet's increased convenient usage has equally granted access to cyber hackers, which quantified cybercrimes. Small and medium-sized businesses (SMB) have become victims of cybercrimes and have negatively affected SMBs' cyber hygiene. The continual practice of good cyber hygiene improves and balances the health of business assets such as hardware devices, people, and software applications. To this end, the level of the hygiene of cybersecurity in the SMBs is still not clear. The paper reports the current cyber health status in SMBs. Our work also examines cyber threats experienced by SMBs, reviewing the use of relevant security measures and their extent of the implementation to maintain good cyber hygiene. The study selected 30 SMB participants in the Western Cape (WC) province, South Africa using purposive sampling. The work used an open-ended online qualitative survey and interviews as the data-collection methods. The collected evidence was analyzed using narrative analysis. The findings revealed that cybersecurity hygiene in SMBs varies from one business sector to the other. The absence of detailed rules, standards, procedures, and guidelines to promote good cybersecurity hygiene leads to poor cyber hygiene in SMBs. Results further showed the limitations of the use of current security measures and their practice. Also, SMBs' employees have minimal knowledge about handling cyber-attacks, thus resulting in significant shortcomings. The study recommended the best ways to maintain good cyber hygiene.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116934735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Stream Cipher Based on Fractional Pseudo Chaotic Random Number Generator 基于分数阶伪混沌随机数发生器的流密码
2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351350
Chunxiao Yang, I. Taralova, J. Loiseau, S. E. Assad
{"title":"A Stream Cipher Based on Fractional Pseudo Chaotic Random Number Generator","authors":"Chunxiao Yang, I. Taralova, J. Loiseau, S. E. Assad","doi":"10.23919/ICITST51030.2020.9351350","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351350","url":null,"abstract":"In this paper, we focus on the design of fractional pseudo-chaotic random number generator (FPCRNG) based on the coupling of fractional chaotic systems. The proposed FPCRNG is composed of 3 fractional chaotic systems, including one fractional generalized double-humped logistic system, two 3D fractional systems Chen's system and Lu's system, and one classical skew-tent map. A non-uniform grid calculation method is employed by introducing the skew-tent map into the numerical calculation of the states of the Chen's system and Lu's system to obtain greater chaoticity in terms of Lyapunov exponent. The XOR (exclusive-or) operations are applied to the fractional systems to obtain the final pseudo-chaotic outputs. The security analysis and statistical experiment of a stream cipher implementing the FPCRNG prove that the proposed structure is effective and can be used in the cryptosystem.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"854 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127957556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fast and Reliable DDoS Detection using Dimensionality Reduction and Machine Learning 使用降维和机器学习的快速可靠的DDoS检测
2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351347
Zein Ashi, Laila Aburashed, Mohammad Al-Fawa'reh, Malik Qasaimeh
{"title":"Fast and Reliable DDoS Detection using Dimensionality Reduction and Machine Learning","authors":"Zein Ashi, Laila Aburashed, Mohammad Al-Fawa'reh, Malik Qasaimeh","doi":"10.23919/ICITST51030.2020.9351347","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351347","url":null,"abstract":"Distributed Denial of Service (DDoS) Attack poses a rising threat on cloud computing systems in which the attacker exploits machines from outside and inside the cloud system to initiate the attack against. To prevent DDoS attack, real-time analysis of the cloud network traffic is fundamental. Machine learning techniques are an effective solution to develop a robust Intrusion detection system in cloud computing systems. This paper proposed a machine learning framework, explores the possibility of utilizing a machine learning classifier to detect the DDoS attack on cloud computing systems; first by the full dimensions of the features, second by reducing these dimensions. Our framework is characterized by a high accurate rate in detecting emerging DDoS attacks, and its lightweight algorithm.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128131533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Session 1: Cyber Security 第一部分:网络安全
2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) Pub Date : 2020-12-08 DOI: 10.23919/icitst51030.2020.9351334
{"title":"Session 1: Cyber Security","authors":"","doi":"10.23919/icitst51030.2020.9351334","DOIUrl":"https://doi.org/10.23919/icitst51030.2020.9351334","url":null,"abstract":"","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133050355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信