{"title":"Combating Ransomware using Content Analysis and Complex File Events","authors":"Michael J. May, Etamar Laron","doi":"10.1109/NTMS.2019.8763851","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763851","url":null,"abstract":"Crypto-ransomware are programs that encrypt files and demand payment for their release or decryption. A common tactic to combat ransomware is file monitoring for suspicious modifications and recovery from (automatically maintained) backups. We offer two techniques to improve the state of the art: the consideration of the file lifecycle and the use of content analysis. We consider the file lifecycle using complex events that allow us to better reflect the user's mental model (what the user thinks he is doing), leading to more intelligent file event processing. Content analysis using Apache Tika allows us to detect attacks by watching for suspicious content type changes. We implement both techniques in a tool (ARW) and prove its effectiveness against the $ucyLocker ransomware. Both techniques should be considered for integration into existing anti-ransomware tools to improve their effectiveness.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115076254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fistful of Votes: Understanding the Voting System in Social Question and Answer Websites","authors":"Jun Zhang, H. Labiod, W. Meng","doi":"10.1109/NTMS.2019.8763775","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763775","url":null,"abstract":"Recently, there is an increasing trend that people start sharing their comments in online question and answer (QA) websites. For such websites, the ranking of answers is usually determined based on several factors like the received upvotes and downvotes, the publishing time, and the reputation of users, such that a highly ranked answer has much more chances to be propagated over the Internet. Due to the popularity of these QA websites, some public relationship companies try to cheat users by promoting or blocking certain answers. In this paper, we take Quora and Zhihu as two case studies to understand the impact of follower numbers, the publishing time, the upvotes and downvotes on the ranking of answers, and to investigate how these websites are vulnerable to voting spammers. Meanwhile, we propose a scheme to estimate the list of downvotes, which is usually hidden behind such websites.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114366478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT in Effective Distance Learning Process","authors":"Rodion Yakoubovsky, V. Sarian","doi":"10.1109/NTMS.2019.8763805","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763805","url":null,"abstract":"IOT in distance learning and self education allow to increase the efficiency of studying up to 20% more. During the video lesson the IOT devices are monitoring the level of the brain activity and sending the feedback to the software program. Digital image and video stream are modulated with the signals which switch the brain into the active state. At the periods of tiredness or/and the important moments of the lecture course these signals are keeping the brain in active state and allow to increase the efficiency of memorisation and boost up the overall learning process.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114518742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vatsal J. Saglani, Bharat S. Rawal, V. Vijayakumar, Longzhi Yang
{"title":"Big Data Technology in Healthcare: A Survey","authors":"Vatsal J. Saglani, Bharat S. Rawal, V. Vijayakumar, Longzhi Yang","doi":"10.1109/NTMS.2019.8763812","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763812","url":null,"abstract":"\"In God we trust, all others must bring data,\" quoted by W. Edwards Deming an American engineer, statistician, and professor, have seemed to have taken quite the literal sense in this coming of age world were Robotics, AI, and Machine Learning have become the touchstone of every new burgeoning technology. Today data is not endemic to its source or any organization or an individual; data is omnipresent. Anywhere and everywhere, data flow can be observed, and these data can be saved and analyzed to obtain some confounding observations. To handle the processing of such massive and continually evolving datasets/databases, the concept of Big Data was introduced. This paper discusses how Big Data technologies have been benign in the Healthcare domain.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114352410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Levshun, A. Chechulin, Igor Kotenko, Yannick Chevalier
{"title":"Design and Verification Methodology for Secure and Distributed Cyber-Physical Systems","authors":"D. Levshun, A. Chechulin, Igor Kotenko, Yannick Chevalier","doi":"10.1109/NTMS.2019.8763814","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763814","url":null,"abstract":"The paper considers a new design and verification methodology for secure and distributed cyber-physical systems, which contain microcontroller-based devices. The key idea of the methodology is in providing of most rational solution to improve the cyber-physical systems according to functional requirements, non-functional requirements and limitations to security and reliability. Moreover, security and reliability of each solution is checked by verification process in terms of its correctness and compatibility. The correctness of design and verification methodology for secure and reliable cyber-physical systems is validated by its use in the improvement of semi-full-scale model of railway infrastructure.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126232429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Kabin, Marcin Aftowicz, Y. Varabei, D. Klann, Z. Dyka, P. Langendörfer
{"title":"Horizontal Attacks using K-Means: Comparison with Traditional Analysis Methods","authors":"I. Kabin, Marcin Aftowicz, Y. Varabei, D. Klann, Z. Dyka, P. Langendörfer","doi":"10.1109/NTMS.2019.8763777","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763777","url":null,"abstract":"AI means are widely used to detect correlations in large data sets. This makes them an ideal candidate to improve side channel analysis attacks as the core feature if these attacks is to reveal the correlation between measurement values and the key bits processed. In this paper we present an assessment of AI means, i.e. k-means. We investigated the success rate of attacks against three designs with different levels of vulnerability. The result was that even though counter intuitive approaches such as the Pearson correlation coefficient outperform k-means. The highest success rate of the latter was 68.7 per cent of an uncompressed trace and 88.3 per cent for a compressed trace whereas the Pearson correlation coefficient achieved 91.7 per cent for the uncompressed trace and 89.3 per cent for the compressed trace.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115858534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Energy-Efficient Protocol in Delay Tolerant Networks for IoT Systems","authors":"A. Elsaadany, M. Hassan","doi":"10.1109/NTMS.2019.8763841","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763841","url":null,"abstract":"The wide spreading of IoT applications requires the development or modification of networking protocols in order to ensure messages delivery and alleviate problems such as intermittent connections. While these new applications differ in their delivery requirements, existing protocols do not realize the variation in message delivery requirements or the nature of the message to be delivered. This on top of the fact that the sending nodes have limited energy for the sensing and sending of the messages. In this paper, we propose a new routing protocol that addresses the message delivery probability under constrained energy source and how the application of this protocol can improve the performance of delay tolerant networks. The results of our network model demonstrate the improvements in the nodes' energy level while effectively reducing the overhead that existed due to high number of unnecessary messages copies.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114611980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Edge Assistance Information for Radio Access Network Optimization","authors":"I. Atanasov, E. Pencheva, Ivaylo Asenov","doi":"10.1109/NTMS.2019.8763778","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763778","url":null,"abstract":"Fifth generation (5G) networks are expected to incorporate more intelligence in order to predict the traffic and mobility patterns and to optimize the performance. Multi-access-Edge Computing may contribute to performance optimization by distributing cloud computing and storage capabilities in the vicinity to end users. In this paper, we propose a new mobile edge service which enables external applications to provide information about foreseen or expected User Equipment (UE) activity and mobility. The applications may gather radio network and location information to calculate UE behavior patterns and to send to the network information that may help to optimize resource management procedures.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128240838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Urban Sensing: Towards Security Efficient Sensing Network Scheme","authors":"S. Khanji, M. Badra, O. Alfandi, Rouba Borghol","doi":"10.1109/NTMS.2019.8763829","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763829","url":null,"abstract":"The recent advancements in information and communication technologies are tackling problems in cities that do strive for urbanization; from economy and transportation, to sustainable and luxury life style. The concept of smart cities is being widespread and several suggested sensing paradigms are currently adopted. Participatory sensing applications offer plenty advantages over the traditional networking sensors, however; its applicability is highly dependent on the voluntary participation of its owners which can be strictly bounded by security challenges. This paper highlights the security concerns in the context of urban sensing scheme and their direct implications on the embracement of such a paradigm. Moreover, it surveys suggested countermeasures to overcome the possible exposure of user's private information. The research's findings formulate the required knowledge upon which more robust and rigid urban sensing scheme can be visualized.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127415993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tomoki Chiba, Y. Sei, Yasuyuki Tahara, Akihiko Ohsuga
{"title":"Trajectory Anonymization: Balancing Usefulness about Position Information and Timestamp","authors":"Tomoki Chiba, Y. Sei, Yasuyuki Tahara, Akihiko Ohsuga","doi":"10.1109/NTMS.2019.8763833","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763833","url":null,"abstract":"Movement trajectories can provide useful information for all fields. However, they may have high privacy parameters, sharing trajectory data with other operators without anonymization carries the risk of linking movement trajectories to individuals. Therefore, it is necessary to consider applying privacy protection to trajectory data. Anonymization indicators, such as k—anonymity are generally adopted for anonymization of trajectory data. Some studies modify position information to achieve anonymity. This modification sometimes produces inaccuracies in data sets. In this study, to reduce the modification distance of the position, we propose an algorithm that allows the mismatch of time when the position information is acquired within a certain range. Further, we define indicators that represent distortions of position and time information. As a result of comparing the proposed method and the existing method, the usefulness of the proposed method is shown.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117000491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}