Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)最新文献

筛选
英文 中文
Container Security: An Extensive Roadmap 容器安全:一个广泛的路线图
Suganthi Subramanian, Prasad B. Honnavalli, S. Shylaja
{"title":"Container Security: An Extensive Roadmap","authors":"Suganthi Subramanian, Prasad B. Honnavalli, S. Shylaja","doi":"10.2991/ahis.k.210913.053","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.053","url":null,"abstract":"The containers play a crucial role in the cloud environment during application deployment as it shares same OS kernel. It reduces resource requirements and start-up time for deploying applications by an individual organizations or users. Even though containers provide light-weight virtualization, it generates a security bottleneck for the number of dedicated resources, libraries, and applications since the container isolation is comparatively weak to the legacy VMs. In the general architec ture of container, attackers can perform privilege escalation by exploiting the kernel vulnerabilities to gain the root privilege and leaks the critical information of a system. To address the present security concerns in the container, a better security based solution is essential. In this work, an extensive analysis is performed to predict the various existing access control mechanisms used for security purposes and the challenges encountered during the architecture modeling. Some use cases are considered to ensure the fulfilment of security requirements such as container protection, inter-container protection, and host protection, and it needs to provide both software and hardware solutions. This work also includes the research problems, research gaps, and further research extensions to provide security to the containers.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132564146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Impact of Beacon Interval and Neighbor Timeout Timer on the Performance of Geographical Routing in FANETs 评估信标间隔和邻居超时定时器对地理路由性能的影响
V. Singh, K. Sharma, H. Verma
{"title":"Evaluating the Impact of Beacon Interval and Neighbor Timeout Timer on the Performance of Geographical Routing in FANETs","authors":"V. Singh, K. Sharma, H. Verma","doi":"10.2991/ahis.k.210913.041","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.041","url":null,"abstract":"Geographical routing provides a robust and scalable routing solution for Flying Ad Hoc Networks (FANETs). In this, the reliability of forwarding decisions depends on the accuracy of the position information of neighboring nodes stored in the neighbor table. Each node broadcasts beacon packets to exchange its position with neighboring nodes after a fixed time interval known as beacon interval (BI) to construct the neighbor table. The node that receives the beacon packet adds an entry in its neighbor table for the originator of a beacon. That entry is valid only for a specific time called neighbor timeout timer (NTOT). The fixed value setting of beacon interval and neighbor timeout timer may deteriorate the routing performance in a dynamic scenario like FANETs, where network characteristics change frequently. Therefore, in this paper, we investigate the impact of fixed beacon interval and fixed neighbor timeout timer on the performance of geographical routing. To do so, extensive simulations are conducted by varying the value of beacon interval and neighbor timeout timer for different network settings in ns-3. The simulation results demonstrate that the beacon interval and neighbour timeout timer significantly affects the performance of geographical routing. Also, geographical routing exhibits the best performance at BI = 0.5s and NTOT = 1.5s in most network conditions.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125194428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Review of Common Web Application Breaching Techniques (SQLi, XSS, CSRF) 常见Web应用程序入侵技术综述(SQLi、XSS、CSRF)
Chee Sam Cheah, Vinesha Selvarajah
{"title":"A Review of Common Web Application Breaching Techniques (SQLi, XSS, CSRF)","authors":"Chee Sam Cheah, Vinesha Selvarajah","doi":"10.2991/ahis.k.210913.068","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.068","url":null,"abstract":"Regarded as one of the most popular platforms for digital services and content delivery over the internet, web application has been transforming our society for the better. However, with an increasing amount of critical services built upon web applications across government and private sectors, web applications have become a clear target for adversaries driven by financial or political motives. Although security standards such as the OWASP ASVS are being actively developed by security researchers to counteract the attacks on web applications, the concept of secure coding remains hostile for many developers, resulting in developed systems with various underlying vulnerabilities. This paper aims to provide an overview of the most common web application breaching techniques, with explanations to their working principles, proof of concept examples as well as applicable countermeasures.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"16 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125784741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strategic Framework for Campus Network Environment Using Virtual Switching System 基于虚拟交换系统的校园网环境战略框架
C. J. Jamuna, R. Ashok kumar, S. Santhosh Belvadi
{"title":"Strategic Framework for Campus Network Environment Using Virtual Switching System","authors":"C. J. Jamuna, R. Ashok kumar, S. Santhosh Belvadi","doi":"10.2991/ahis.k.210913.040","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.040","url":null,"abstract":"","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116541631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conceptual Analytics on Integration of Network Technologies with Crowdsourcing Infrastructure 网络技术与众包基础设施融合的概念分析
S. Sivachandiran, Mohan.K Jagan, Nazer.G Mohammed
{"title":"Conceptual Analytics on Integration of Network Technologies with Crowdsourcing Infrastructure","authors":"S. Sivachandiran, Mohan.K Jagan, Nazer.G Mohammed","doi":"10.2991/ahis.k.210913.019","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.019","url":null,"abstract":"Technology seeks a new dimension as collaboration of various methods and technologies in transmission of data. Crowdsourcing enables the availability of huge data over a variety of networks. It is important to understand the needs of the management and monitoring of such data over a long distance and among a huge population especially among a big crowd like that of temples and other public places. Hence integration of network technologies has to be considered for effective attainment of data transfer with high speed and better performance that includes latency. The paper conducts analytics of various collaborated network technologies that was utilised to handle huge data from a crowdsourced network. The network technologies considered for the reviews are Edge computing, Fog computing, IoT based sensors, mobile technologies and cloud-based platforms. After significant analysis of all the research works, it was identified that edge computing has been the chief network technology used to transmit crowdsourced data with speed and efficiency. Cloud platforms assist the transferred data to be stored with privacy and security. The IoT sensors and Fog computing helped in detecting the data and also to increase the bandwidth and improve latency problems. The research gap identified was to enhance the speed and efficiency of transmission in public related problems like surveillance and handling public or social media database which seemed to be more challenging and encouraging future research works.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114912295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Edible and Non-Edible Mushroom Through Convolution Neural Network 基于卷积神经网络的食用菌与非食用菌鉴别
G. Devika, A. Karegowda
{"title":"Identification of Edible and Non-Edible Mushroom Through Convolution Neural Network","authors":"G. Devika, A. Karegowda","doi":"10.2991/ahis.k.210913.039","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.039","url":null,"abstract":"Mushroom is one among the most popular consumed food in India. In India people are cultivating mushroom as viable income source for their livelihood. Now-a-days deep learning is being applied to process big data and vision related applications. Recent smart devices can be utilized for automated edibility diagnosis of mushroom using deep convolution neural network (CNN) it has revealed a remarkable performance capability in all its sphere of research activities. DCNN works on static dataset. The models on which it applies will pose as well determine its requirement for training. This paper presents a classification tool for edibility detection of mushroom through deep CNN. Better performance is obtained by tuning the hyper-parameters and through adjustments in pooling combinations in order to obtain real time inference suitably. DCNN has been trained with a data set of segmentation as train and test sets. Performance is analyzed on sNet, Lenet, AlxNet, cNET network architectures. DCNN results are comparatively better in its performance.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115015798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Blockchain Technology Adoption by Malaysian Higher Education Institutes: A Perspective of Integrated Tam Model and Toe Framework 马来西亚高等教育机构采用区块链技术:综合Tam模型和Toe框架的视角
Waleed Iftikhar, D. M. Vistro, Zunair Mahmood
{"title":"Blockchain Technology Adoption by Malaysian Higher Education Institutes: A Perspective of Integrated Tam Model and Toe Framework","authors":"Waleed Iftikhar, D. M. Vistro, Zunair Mahmood","doi":"10.2991/ahis.k.210913.077","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.077","url":null,"abstract":"The purpose of this research is to identify and investigate the factors that influence Blockchain technology adoption in Malaysian higher education sector. This research has proposed a theoretical framework for Blockchain technology adoption based on Integrated TAM model and TOE framework constructs. The seven factors examined in this research are relative advantage, perceived ease of use, perceived usefulness, scalability concern, top management support, competitive pressure and regulatory policy. Factors are categorized in the Technological, organizational and environmental context. A questionnaire-based survey was used to collect the primary data for this research, from five Malaysian higher education institutes. Hypothesis for this research were derived using the proposed research framework and previously published literature, and further tested using multiple linear regression. The findings of the statistical analysis reveal that, perceived usefulness, competitive pressure and top management support have a significant and positive influence on Malaysian higher education institutes intention to adopt Blockchain technology. This research was performed in the Malaysian higher education sector, so this may limit the generalizability of the relevant findings. The findings of this research provide a better understanding of which technological, organizational and environmental factors affect the Blockchain adoption process in the Malaysian higher education institutes. This research contributes to the theoretical body of knowledge of the technology adoption, by examining unique external variables with an integrated TAM model and TOE framework approach.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131021030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Outdoor Parking Payment with IoT in Malaysia 在马来西亚使用物联网支付户外停车费用
Ong Chun Heng, I. F. Kamsin
{"title":"Outdoor Parking Payment with IoT in Malaysia","authors":"Ong Chun Heng, I. F. Kamsin","doi":"10.2991/ahis.k.210913.063","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.063","url":null,"abstract":"Internet of Things (IoT) will bring a paradigm shift in technology that will potentially change the behaviour of things in our daily lives. It has been shown by current technology like smart devices, are starting to adopt sensors to enhance the experience of the users. This research aims to improve the efficiency of the process of paying for outdoor parking and reduce the effort of paying manually at ticketing booth. This research will also discuss samples collected based on college students and working adults and their opinions of the system. It is to evaluate the technology exposure and knowledge of the user in order to be comfortable with using the system. This research will be contributing to the development of smart city by integrating IoT technology into parking system in order to improve the experience and future research is needed to enhance the security of the system.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121387451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An AI Based Web Portal for Cotton Price Analysis and Prediction 基于人工智能的棉花价格分析与预测门户
M. Bohara, Krishna Patel, B. Patel, Jesal Desai
{"title":"An AI Based Web Portal for Cotton Price Analysis and Prediction","authors":"M. Bohara, Krishna Patel, B. Patel, Jesal Desai","doi":"10.2991/ahis.k.210913.005","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.005","url":null,"abstract":"Artificial Intelligence based Web portal is extensively used in worldwide because it used to solve various primary low level problems in agriculture such as predicting precise prices of agriculture product using machine learning algorithms, enabling direct connection between buyer and seller without any middlemen, decreasing wastage of post-harvest crop, fixing appropriate price margin for farmers and so on. These steps helps to increase the capital income and creates the beneficial changes in the agriculture and also it leads to take the agriculture to next level. Cotton is a crop that is possibly the most expensive including all agricultural products sold. Owing to the high uncertainty of cotton markets, it is incredibly difficult to forecast future demand patterns and develop an acceptable pricing plan in order to compete in the market and maximize the company's volume for long-term development. Keeping in mind all the factors stated above for the cultivation of cotton, conclusion can be inferred as the cotton is highly volatile in nature. In this paper, we tend to build an Artificial Intelligence based Web Portal which provides data analysis of price of past years and also gives predictions about the cotton prices to the fellow traders. The paper aims to create a web model for cotton price prediction. Furthermore, the study tries to run a multiple regression model based on different variables to estimate the price of cotton.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124765603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detection of Partially Occluded Faces Using Convolutional Neural Networks 基于卷积神经网络的部分遮挡人脸检测
H. Chethana, C. N. Trisiladevi, M. Shashank
{"title":"Detection of Partially Occluded Faces Using Convolutional Neural Networks","authors":"H. Chethana, C. N. Trisiladevi, M. Shashank","doi":"10.2991/ahis.k.210913.010","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.010","url":null,"abstract":"Partial occlusion in the face refers to the local region of the face with objects such as sunglasses, scarf, hands and beard which leads to loss of information thereby affecting the overall recognition accuracy. It is one of the challenging problems in computer vision. There are many traditional perceptions based models which have become perfect vehicles for identifying partially occluded facial images in unconstrained environments but they fail to be recognized in constrained environments. The images captured under low lighting conditions and noisy situations are called facial images with a constrained environment. The main contribution of this paper is to recognize partially occluded faces using Convolutional Neural Networks (CNN) in a constrained environment. Hence, an attempt is made in this direction to improve the recognition accuracy for partially occluded facial images. Experimental results demonstrated that the proposed system provides a confidence level of 93% and it outperforms the state of art with the other existing partially occluded face recognition algorithms.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123046226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信