2021 International Conference on Information Security and Cryptology (ISCTURKEY)最新文献

筛选
英文 中文
A Hybrid Watermarking Scheme Based on Arnold Cat Map Against Lossy JPEG Compression 基于Arnold Cat Map的JPEG有损压缩混合水印方案
2021 International Conference on Information Security and Cryptology (ISCTURKEY) Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654333
A. Mohammed, Mohammed A. M. Abdullah, E. Elbasi
{"title":"A Hybrid Watermarking Scheme Based on Arnold Cat Map Against Lossy JPEG Compression","authors":"A. Mohammed, Mohammed A. M. Abdullah, E. Elbasi","doi":"10.1109/ISCTURKEY53027.2021.9654333","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654333","url":null,"abstract":"Watermarking is a data hiding method for multimedia elements such as image, video, audio, and software. Several works have been conducted in the spatial frequency domains for cover images. An essential demand in the watermarking algorithm is to be resistant to common attacks. In this work, the authors investigate the robustness and reliability of the transform domain watermarking against the Lossy JPEG compression, which is widely used in digital imaging applications and hardware. In addition, we propose a transform domain digital watermarking algorithm that resists the JPEG compression in low frequencies. The Discrete Fourier transform (DFT) and the Singular value decomposition (SVD) are selected as the embedding domain where the binary logo watermark is iteratively scrambled using the Arnold Cat Map (ACM) before embedding for robustness. Two main metrics are used for evaluation the scheme; Peak signal to noise ratio (PSNR) and Normalized Correlation (NC). Experimental results show very promising results with a PSNR value above 45 dB while the NC value remains above 0.9 even after high compression with a Quality Factor of only 1%.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121385351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
TasKar: A Research and Education Tool for Calculation and Representation of Binary Classification Performance Instruments 任务:二分类性能仪器的计算和表示的研究和教育工具
2021 International Conference on Information Security and Cryptology (ISCTURKEY) Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654359
Gürol Canbek, T. T. Temizel, Ş. Sağiroğlu
{"title":"TasKar: A Research and Education Tool for Calculation and Representation of Binary Classification Performance Instruments","authors":"Gürol Canbek, T. T. Temizel, Ş. Sağiroğlu","doi":"10.1109/ISCTURKEY53027.2021.9654359","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654359","url":null,"abstract":"This study covers almost the ultimate set of binary-classification performance instruments derived from four dimensions of a confusion matrix, namely true positives/negatives and false positives/negatives and enhances their representation by establishing a meaningful interpretation of the dimensions. A common textual formatting scheme is provided to improve the readability and comprehensibility of performance instruments’ representation. A compact dashboard (named ‘TasKar’, the abbreviation of ‘Tasnif Karnesi’, ‘Classification Report’ in Turkish) is developed and provided online to calculate and visualize a total of 52 performance instruments (27 measures, 23 metrics, and 2 indicators) by entering confusion matrix elements only. Taking parametric, variant, and recently proposed instruments the number covered becomes 65. Despite the limited approaches in confusion matrix visualization in the literature, three new graphics were devised to visualize true/false positive/negative rates (TPR, FPR, TNR, FNR), positive/negative predictive values (PPV, NPV), and false discovery/omission rates (FDR, FOR) performance metrics. It is expected that the proposed method and tool will be used by researchers in computation, interpretation, and standardized representation of classification performance as well as by teachers and students in machine learning education.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130821129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Zero Trust: The Design and Implementation of a Secure End-Point Device for Remote Working 迈向零信任:远程工作安全终端设备的设计与实现
2021 International Conference on Information Security and Cryptology (ISCTURKEY) Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654298
K. Bicakci, Y. Uzunay, Mansoor Khan
{"title":"Towards Zero Trust: The Design and Implementation of a Secure End-Point Device for Remote Working","authors":"K. Bicakci, Y. Uzunay, Mansoor Khan","doi":"10.1109/ISCTURKEY53027.2021.9654298","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654298","url":null,"abstract":"COVID-19 pandemic and lockdowns forced employees across the world to work from home. Remote working has become a necessity rather than a choice. However, in order to meet this increasing demand, the most pressing security concerns of organizations should be addressed. In this paper, we present the design and implementation of ProGun, an end-point device (a USB dongle) for remote working. We present the hardware/software co-design of ProGun, by which most security risks due to lack of physical protection could be mitigated. We also discuss choices we made among many alternatives for user authentication and their security and usability implications in a remote working environment.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130492734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A system for redicting SQLi and XSS Attacks 一个用于预测sql和XSS攻击的系统
2021 International Conference on Information Security and Cryptology (ISCTURKEY) Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654416
Mehmet Serhan Erçi̇n, E. Yolacan
{"title":"A system for redicting SQLi and XSS Attacks","authors":"Mehmet Serhan Erçi̇n, E. Yolacan","doi":"10.1109/ISCTURKEY53027.2021.9654416","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654416","url":null,"abstract":"In this study, it is aimed to reduce False-Alarm levels and increase the correct detection rate in order to reduce this uncertainty. Within the scope of the study, 13157 SQLi and XSS type malicious and 10000 normal HTTP Requests were used. All HTTP requests were received from the same web server, and it was observed that normal requests and malicious requests were close to each other. In this study, a novel approach is presented via both digitization and expressing the data with words in the data preprocessing stages. LSTM, MLP, CNN, GNB, SVM, KNN, DT, RF algorithms were used for classification and the results were evaluated with accuracy, precision, recall and F1-score metrics. As a contribution of this study, we can clearly express the following inferences. Each payload even if it seems different which has the same impact maybe that we can clearly view after the preprocessing phase. After preprocessing we are calculating euclidean distances which brings and gives us the relativity between expressions. When we put this relativity as an entry data to machine learning and/or deep learning models, perhaps we can understand the benign request or the attack vector difference.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129252952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring and Improving the Usability of ModSecurity Web Application Firewall ModSecurity Web应用防火墙可用性的探索与改进
2021 International Conference on Information Security and Cryptology (ISCTURKEY) Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654294
Murat Alagoz, Mevlut Serkan Tok, K. Bicakci
{"title":"Exploring and Improving the Usability of ModSecurity Web Application Firewall","authors":"Murat Alagoz, Mevlut Serkan Tok, K. Bicakci","doi":"10.1109/ISCTURKEY53027.2021.9654294","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654294","url":null,"abstract":"ModSecurity is an open-source web application firewall. The correct configuration is key to its effective operation but could be tricky since usability flaws could lead to errors and misconfiguration, threatening the security and availability. In this study, we first conduct the usability inspection of ModSecurity through a hybrid approach consisting of heuristic evaluation and cognitive walkthrough. We find out that ModSecurity has no feedback for semantic errors or successful rule implementation during the rule entry process, and the webserver goes down if there is a syntax error in any implemented rule. We propose a rule checking and feedback mechanism to mitigate these drawbacks. Then, we perform a between-subjects user study to evaluate the effectiveness and usability of our proposed method. The results indicate that unsuccessful rule entry rate and syntax error-related web server downtime significantly reduced with the rule checking and feedback mechanism introduced to ModSecurity. Thereby, we improve ModSecurity’s effectiveness as well as the level of security and availability of ModSecurity-protected web servers.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124319308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Based Solutions for Effective and Secure Management of Electronic Health Records 基于区块链的电子健康记录有效安全管理解决方案
2021 International Conference on Information Security and Cryptology (ISCTURKEY) Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654325
ALhumeira Faroug, Mehmet C. Demirci
{"title":"Blockchain-Based Solutions for Effective and Secure Management of Electronic Health Records","authors":"ALhumeira Faroug, Mehmet C. Demirci","doi":"10.1109/ISCTURKEY53027.2021.9654325","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654325","url":null,"abstract":"Traditional medical systems are vulnerable to attacks, leaks, and loss of data. The centralized structure of medical systems makes them more susceptible to attacks. Blockchain can be used as a solution to this issue. In particular, using blockchain to track patient medical history and vaccination records can guarantee privacy and security, which are critical requirements for healthcare systems. In this paper, we propose a blockchain-based application to maintain and share medical data and vaccination records using Hyperledger Fabric and Ethereum platforms to ensure data integrity and immutability. Our vaccination tracking system based on the Ethereum platform allows easy verification for people who want to travel abroad. For this system, we employ Ganache to test these vaccination records in a safe and deterministic environment. We have evaluated the performance of our implementation using Hyperledger Caliper and Explorer. The results show that our blockchain-based systems can increase the efficiency and transparency of tracking medical and vaccination records. We believe our proposal is especially valuable in the context of the ongoing COVID-19 pandemic because it providesa secure way to update, share and verify vaccination records.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127183894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Android Pre-installed Applications Effects On User’s Privacy Android预装应用程序对用户隐私的影响
2021 International Conference on Information Security and Cryptology (ISCTURKEY) Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654324
Abdullah Özbay, K. Bicakci
{"title":"Android Pre-installed Applications Effects On User’s Privacy","authors":"Abdullah Özbay, K. Bicakci","doi":"10.1109/ISCTURKEY53027.2021.9654324","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654324","url":null,"abstract":"Vendors are allowed put any pre-installed applications on their devices that have open-source Android operating system. Even if these applications have risk on users’ privacy and security, number of studies that analyze them in that context inclusively is limited. In this study, a public data set of pre-installed applications to fulfill the gap in this field is introduced. Also, using these data set, effects of Tracking Software Development Kits that have been found in pre-installed application on user privacy are analyzed. Thus, exploration of pre-installed tracking ecosystem on systems is contributed, and relationship between these software and third parties is exposed. Moreover, with a user study, users’ knowledge and perceptions about pre-installed applications are measured and their awareness levels are revealed.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132809320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ISCTURKEY 2021 Copyright Page ISCTURKEY 2021版权页面
2021 International Conference on Information Security and Cryptology (ISCTURKEY) Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654314
{"title":"ISCTURKEY 2021 Copyright Page","authors":"","doi":"10.1109/ISCTURKEY53027.2021.9654314","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654314","url":null,"abstract":"","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132220713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QDNS: Quantum Dynamic Network Simulator Based on Event Driving 基于事件驱动的量子动态网络模拟器
2021 International Conference on Information Security and Cryptology (ISCTURKEY) Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654307
Osman Ceylan, I. Yilmaz
{"title":"QDNS: Quantum Dynamic Network Simulator Based on Event Driving","authors":"Osman Ceylan, I. Yilmaz","doi":"10.1109/ISCTURKEY53027.2021.9654307","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654307","url":null,"abstract":"After the no-cloning theory was presented in the quantum physics field, researchers offered more secure but theoretical protocols than classic ones shaped around this theorem. Without much time passed, we then observed that experimental studies have been made particularly for the national security concerns. In line with these events, with this study, we are presenting the QDNS, an event driven quantum network simulation framework for enthusiasts of the filed to simulate their custom protocols in quantum network topology. With the event triggered way, we tried to make a more understandable and user-friendly environment yet powerful enough to take into account of complex nature of the quantum world.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116159229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sharing Cyber Threat Intelligence and Collaboration 共享网络威胁情报和协作
2021 International Conference on Information Security and Cryptology (ISCTURKEY) Pub Date : 2021-12-02 DOI: 10.1109/ISCTURKEY53027.2021.9654328
Ali Melih Kanca, Ş. Sağiroğlu
{"title":"Sharing Cyber Threat Intelligence and Collaboration","authors":"Ali Melih Kanca, Ş. Sağiroğlu","doi":"10.1109/ISCTURKEY53027.2021.9654328","DOIUrl":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654328","url":null,"abstract":"With the developing technology, cyber threats are developing rapidly, and the motivations and targets of cyber attackers are changing. In order to combat these threats, cyber threat information that provides information about the threats and the characteristics of the attackers is needed. In addition, it is of great importance to cooperate with other stakeholders and share experiences so that more information about threat information can be obtained and necessary measures can be taken quickly. In this context, in this study, it is stated that the establishment of a cooperation mechanism in which cyber threat information is shared will contribute to the cyber security capacity of organizations. And using the Zack Information Gap analysis, the deficiency of organizations in sharing threat information were determined and suggestions were presented. In addition, there are cooperation mechanisms in the USA and the EU where cyber threat information is shared, and it has been evaluated that it would be beneficial to establish a similar mechanism in our country. Thus, it is evaluated that advanced or unpredictable cyber threats can be detected, the cyber security capacities of all stakeholders will increase and a safer cyber ecosystem will be created. In addition, it is possible to collect, store, distribute and share information about the analysis of cyber incidents and malware analysis, to improve existing cyber security products or to encourage new product development, by carrying out joint R&D studies among the stakeholders to ensure that domestic and national cyber security products can be developed. It is predicted that new analysis methods can be developed by using technologies such as artificial intelligence and machine learning.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117040221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信