{"title":"Multi-Objective Optimization and Decision Making for Greenhouse Climate Control System","authors":"M. Mahdavian, S. Sudeng, N. Wattanapongsakorn","doi":"10.1109/ICISSEC.2016.7885862","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885862","url":null,"abstract":"Optimization of the real-world problems has been always considered by researchers due to its substantial improvement effect on processes. Modeling, simulation and decision making are three major parts of all optimization approaches. In this paper, Tri-objective optimization of an industrial greenhouse climate control system is investigated. In this regard, the greenhouse is modeled by the real measured data. Optimization and decision making are obtained by MATLAB simulator environment and using evolutionary and pruning algorithms. The simulation results verify the significant improvement of greenhouse climate control system efficiency and performance.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127888532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantification for Intrusion Detection System Using Discrete Fourier Transform","authors":"Yusuke Tsuge, Hidema Tanaka","doi":"10.1109/ICISSEC.2016.7885867","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885867","url":null,"abstract":"An Intrusion Detection System (IDS) is a countermeasure against network attack. There are mainly two types of detections; signature-based and anomaly-based. Since attackers change their technique rapidly, anomaly-based detection draws research interest nowadays. Since some anomaly-based IDS depends on operator's visual identification, it is difficult to define normal behavior effectively. To solve the problem, we propose quantification method using Shannon-Hartley theorem which improves Enkhbold et al. method. This method uses Discrete Fourier Transform to analyze spectrum of each session. They assume fluctuation of spectrum in normal sessions as random and abnormal sessions as biased. To quantify difference between each spectrum and the standard one, we can obtain entropy using Shannon-Hartley theorem. By spectrum analysis based on such assumption, it is possible to create the Detection-table which can be determined either normal or abnormal sessions. And we also find out that our quantification method will discover the feature of unknown attack session.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115111656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Database Security in Private Database Clouds","authors":"Onur Cinar, R. H. Guncer, A. Yazıcı","doi":"10.1109/ICISSEC.2016.7885847","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885847","url":null,"abstract":"Cloud computing and cloud systems are very popular in today's Information Technology (IT) and systems and have grown very quickly. Cloud computing helps organizations solve increasing IT costs such as their licenses, power consumption, physical protection, by providing better standardization, higher benefit, greater performance, and quicker responses of information services. Carrying vital importance for our private and secret information, cloud systems must provide extra security solutions for database systems with organizations. While using firewalls, and intrusion detection systems on the network for external attacks, some improved access controls must be definitely decided for internal attacks as well. Using database transaction logs and audit can be very helpful on developing a database protection system. However, storing these logs may cause some serious storage and performance problems. Another problem is to manage multiple databases at the same time. In this study we introduce a new lightweight cloud-based database security solution by enhancing our previously developed database security solution, InfoFence, while managing many databases at the same time from a central point. The performance of our proposed database security system in a private cloud has been evaluated against one of the most commonly used products on the market, Oracle Audit Vault Server, and we show that our proposed solution has better performance results in our test environment.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126476033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Handwritten Music Symbol Classification Using Deep Convolutional Neural Networks","authors":"Sangkuk Lee, S. Son, Jiyong Oh, Nojun Kwak","doi":"10.1109/ICISSEC.2016.7885856","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885856","url":null,"abstract":"In this paper, we utilize deep Convolutional Neural Networks (CNNs) to classify handwritten music symbols in HOMUS data set. HOMUS data set is made up of various types of strokes which contain time information and it is expected that online techniques are more appropriate for classification. However, experimental results show that CNN which does not use time information achieved classification accuracy around 94.6% which is way higher than 82% of dynamic time warping (DTW), the prior state-of-the-art online technique. Finally, we achieved the best accuracy around 95.6% with the ensemble of CNNs.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133801390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Forward Error Correction Scheme to Improve Data Reliability in Solar-Powered Wireless Sensor Networks","authors":"Jong-kwan Jung, Minjae Kang, Ikjune Yoon, D. Noh","doi":"10.1109/ICISSEC.2016.7885838","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885838","url":null,"abstract":"The data-link layer takes charge of reliable inter-node communication in open systems interconnection (OSI) reference model. Generally, in the environment of wireless sensor network (WSN) where errors are frequently occurred, the forward error correction (FEC) method is mainly used at this data-link layer. However, the FEC method requires more amount of energy consumption as it has higher ability of error correction rate, thus reducing the network lifetime seriously. Meanwhile, as the energy is regularly recharged in the solar-powered WSN (in contrast with the battery-based WSN), a greater amount of energy than that required for fundamental operation of nodes might exist in the node. By utilizing this surplus energy efficiently, the proposed energy-aware FEC method can reduce the data loss rate without any decrement of network lifetime. This method uses a trade-off relationship between the energy and data loss rate by adjusting the parity length in the FEC method according to a state of energy in each node. The performance of the proposed scheme is verified through the simulation.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132988398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Threat Model for Software Security Requirement Specification","authors":"Habeeb Omotunde, R. Ibrahim","doi":"10.1109/ICISSEC.2016.7885836","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885836","url":null,"abstract":"Security is often treated as secondary or a non- functional feature of software which influences the approach of vendors and developers when describing their products often in terms of what it can do (Use Cases) or offer customers. However, tides are beginning to change as more experienced customers are beginning to demand for more secure and reliable software giving priority to confidentiality, integrity and privacy while using these applications. This paper presents the MOTH (Modeling Threats with Hybrid Techniques) framework designed to help organizations secure their software assets from attackers in order to prevent any instance of SQL Injection Attacks (SQLIAs). By focusing on the attack vectors and vulnerabilities exploited by the attackers and brainstorming over possible attacks, developers and security experts can better strategize and specify security requirements required to create secure software impervious to SQLIAs. A live web application was considered in this research work as a case study and results obtained from the hybrid models extensively exposes the vulnerabilities deep within the application and proposed resolution plans for blocking those security holes exploited by SQLIAs.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116187917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Utilizing a Distributed Publish/Subscribe System for Connecting Online Shopping Services with Social Funding Projects","authors":"Hyeon Gyu Kim, S. S. Kim","doi":"10.1109/ICISSEC.2016.7885871","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885871","url":null,"abstract":"Our previous work suggested a method to connect online shopping services with social funding projects in order to provide a plenty of donating places for users to provide their shopping rewards and to improve the donation culture in our society. In this paper, we discuss the structure to implement the method using Apache Kafka, a well-known distributed publish/subscribe system, and present several issues found in the implementation of our system in terms of accuracy and security in message trans-mission.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121768391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deployment Scenario and Architecture of MANO for NFV Network Services","authors":"Wonhyuk Lee, Hyuncheol Kim","doi":"10.1109/ICISSEC.2016.7885848","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885848","url":null,"abstract":"The continuous evolution of the telecommunication network architecture has made their network functions to become more available and utilizable. With SDN/NFV network service providers can program their own network functions on the standard commercial hardware platform. SDN/NFV enable more efficient utilization of resources and better service agility. It supports new network services faster and less expensively. However, deployment scenario of MANO architecture for end-to-end NFV network services has not been mentioned. This paper gives an overview of effective MANO platform and proposes a deployment scenario and architecture for NFV network services.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121782451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy Clustering and Association Rule for Improvement of Visitor Spots in the Lanna","authors":"Jirawat Teyakome, Narissara Eiamkanitchat, Korawan Sangkakorn, Phichit Napook","doi":"10.1109/ICISSEC.2016.7885855","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885855","url":null,"abstract":"This paper proposes the tool for the improvement of visitor spots of the Lanna civilization in the northern part of Thailand. Numbers of traveler are visited surrounding tourist spots in this area because of the identity of the culture, however large portions of the tourist attractions here still need to enhance to support the tourist. The propose tool expect to prescribe the subject to enhance for each individual tourist place. The fuzzy framework is used for clustering the features, and create the new values for each feature. The Apriori algorithm is applied and create the association rules. The outcomes demonstrate the connection of the criteria for the evaluated class of the visitor spots. All considered visitor spots in the Lanna civilization in the experiment are prior assessed by the specialists in the tourist study. Related person can use the experimental results as a guideline to improve their tourist attraction and able to estimate the class of their place as well.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116961237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Approximate Iterative Method for Fast Data Analysis in Internet of Things Environment","authors":"Yong-Ju Lee, Ok-Gee Min","doi":"10.1109/ICISSEC.2016.7885844","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885844","url":null,"abstract":"Fast data (the next step after big data) revolution leads to new requirements in data processing platforms. To overcome the fast data bottleneck caused by data in extremely rapid transit, adaptive data approximation is one of the alternative ways to handle incredible data speed. In this paper, we present an approximate iterative method for fast data analysis and investigate what benefits and opportunities might be available in Internet of Things environment.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124298154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}