{"title":"Characteristic Analysis and Modeling of P2PTV Traffic","authors":"Naoki Takeuchi, T. Miyoshi, Olivier Fourmaux","doi":"10.1109/ICISSEC.2016.7885846","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885846","url":null,"abstract":"In recent years, video traffic has been increasing due to the huge demands of video streaming services. Peer-to-peer (P2P) video streaming services (P2PTV) have attracted attention as a solution to decrease the server load because P2P communication can distribute the video data to peers. However, the random peer selection mechanisms of P2PTV conduce to the worldwide spread of P2PTV traffic, and thus it is a large issue to analyze the characteristics of P2PTV traffic. Several traffic measurements have been studied and revealed the characteristics of P2PTV traffic. However, these studies did not focus on users' behavior that has influence on traffic and also did not construct a P2PTV traffic model. In this paper, we analyzed the characteristics of P2PTV traffic that occur in watching a content to construct the P2PTV traffic model of each user. Moreover, we discussed how to model the P2PTV traffic. As a result, we can revealed several characteristics of P2PTV traffic such as the stable traffic and the bursty traffic. Furthermore, we extracted some statistical information and stated modeling the P2PTV traffic.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115505394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Locating and Collecting Cybercrime Evidences on Cloud Storage: Review","authors":"Abdulghani Ali Ahmed, C. Li","doi":"10.1109/ICISSEC.2016.7885861","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885861","url":null,"abstract":"Despite the advancement of cloud storage and the benefits it brings to computer users, it cannot be denied that cloud storage is still subject to misuse by malicious users and cyber criminals. This includes the cases where criminals use cloud storage for storing and exchanging illegal material and for committing botnet attacks. In addition, the increase in the number of cybercrimes against cloud services challenges the forensic process of locating and collecting cybercrime evidence in cloud storage. Although a number of researches are proposed to address cloud storage security, several studies and surveys reported that security in cloud computing still pose several concerns and challenges to the researchers. Loss of control over the data stored in cloud storage is one of the security challenges in that cloud. Moreover, location of stored data in the cloud and the multi tenancy of customers on cloud servers are all representing security concerns. At the same time, current cloud storage technology creates challenges for digital forensic practitioners in presenting and interpreting meaning to the obtained evidence to investigators, lawyers, and, ultimately, to the jury. This paper reviews the existing works in locating and collecting cybercrime evidence in cloud storage and provides an in-depth discussion of their limitations.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129411602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nurul Akhmal Mohd Zulkefli, Roznim Mohamad Rasli, B. Baharudin
{"title":"Trusted Data Travel Blogs Information Focusing on Followers","authors":"Nurul Akhmal Mohd Zulkefli, Roznim Mohamad Rasli, B. Baharudin","doi":"10.1109/ICISSEC.2016.7885869","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885869","url":null,"abstract":"In everyday circumstances, we always search for the best method to find results that we may see as accurate or efficient. However, the question is how do we trust the information? Do we easily use the result without first identifying the trustworthiness? In this paper, we will discuss the issue of trustworthiness especially the information sharing based on user experience. We identify new alternative information source that is followers where we can determine the trustworthiness of particular information. In our case study, we focus on the travel blog data as the travel information is one of the most sharing experiences in the Internet. We found that followers give better effect on trustworthiness. The more followers there are in a blog, the more value of trust is instilled in the blog and the trust value is supported by some new interesting findings which we shall discuss in the discussion section.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130244105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Potential Tourist Attraction Analysis for Senior Tourists in the Lanna Region of Thailand Utilize Neuro-Fuzzy","authors":"Phichit Napook, Narissara Eiamkanitchat, Korawan Sangkakorn, Jirawat Teyakome","doi":"10.1109/ICISSEC.2016.7885864","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885864","url":null,"abstract":"There are numerous tourist attractions in the Lanna region of Thailand, however, with the increasing pattern of the aging population, each place need to be dissected the potential for senior visitors. This paper proposes the application of using Neuro-fuzzy system to assess the readiness of the tourist spot. The considered area, including 8 provinces in Thailand, which considered as the kingdom of Lanna in ancient days. With the specific purpose, experiments are done by modifying the appropriate structure of Neuro-Fuzzy for the dataset. The primary experiment is intended to evaluate the proper membership function, the Gaussian membership function shows the best results among others. Furthermore the experiment to verify the number of networks are made, the results from both 1 network and 2 networks are demonstrating the same accuracy for this dataset.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130700194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Balakirev, K. K. Halder, S. Anavatti, M. Garratt
{"title":"Optimal Reference Frame Search Algorithm for Better Restoration of Image Sequences Distorted by Turbulence of the Medium","authors":"A. Balakirev, K. K. Halder, S. Anavatti, M. Garratt","doi":"10.1109/ICISSEC.2016.7885863","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885863","url":null,"abstract":"This paper presents a novel approach in image restoration based on calculating the pixel shift-maps of geometrically distorted images in a video sequence and using these maps to obtain non-distorted frames by de-warping the originals. In the similar previous approaches, the reference frame in the image registration process for pixel shift-maps calculation is selected either using a blind image quality metric or simply using the first frame. However, the former technique may not estimate the best frame accurately in the sense of geometric distortion. As for the latter, there is always a possibility that the first frame is one of the most distorted ones in the sequence. In the proposed method, an optimal reference frame search algorithm is introduced to improve the quality of restored frames and to yield a stable video output. The proposed method was applied both to synthetic and real data sets, and simulation results show significant improvement in comparison to the state-of- the-art methods.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115654692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Memory Accessing Method for the Parallel Aho-Corasick Algorithm on GPU","authors":"JinMyung Yoon, Kangil Choi, H. Kim","doi":"10.1109/ICISSEC.2016.7885837","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885837","url":null,"abstract":"In this paper, we propose a memory accessing method of Parallel Failureless Aho-Corasick (PFAC) algorithm considering Graphic Processing Unit (GPU) memory architecture for throughput improvement. Compared with Aho-Corasick (AC) Algorithm using Central Processing Unit (CPU) and Data-Parallel Aho-Corasick (DPAC) using Open Multi-Processing (OpenMP), PFAC using GPU achieves high performance advancement in the string matching. However, due to the increasing network speed, there is need to increase the throughput of the string matching engine. In order to solve the problem of frequent memory accesses of the string matching engine based the AC algorithm, we propose the method of memory accesses for the PFAC algorithm. In the experiments using attack pattern from Snort and input stream from DEFCON on NVIDIA GTX 660. Our memory accessing method achieves about 10% improvement of throughput, compared with the original PFAC algorithm.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124158311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of ICT for Exercise Data Management","authors":"Seungae Kang, Sunyoung Kang","doi":"10.1109/ICISSEC.2016.7885843","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885843","url":null,"abstract":"Mobile devices, easily accessibly without constraints of time or space, have emerged as a means to replace existing mode of exercise. Smartphone applications have been the most commonly adopted for exercise data management. As users can select their desired applications, convenience increases significantly. Wearable devices, which feature tracking terminals, have gained grounds rapidly even in health and sports segments of the market as they have optimal conditions for exercise data management. For efficient exercise data management, various devices, not existing single platform, should be used, and various content services should be provided. Amid trends towards synchronization of various mobile devices with services over time, the exercise data management is expected to advance into new realm and adopt new values.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128829935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Editing LiDAR-Based Terrains with Height and Texture Maps","authors":"Woosuk Shin, Nakhoon Baek","doi":"10.1109/ICISSEC.2016.7885850","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885850","url":null,"abstract":"The LiDAR technology is a data capturing tool that measures distances by illuminating the targets with laser lights. Many geometric applications use this LiDAR technology to build terrains and 3D models of buildings, cultural heritages and variety of objects. Efficiently handling point clouds from the LiDAR scanners is critical for data handling. In this paper, we present a LiDAR-based terrain editing tools, with height maps and texture maps to address all the requirements. Its performance and efficiency gains are also presented.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129229317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jocelyn Chan Ming Ji, Hui Na Chua, Hong Seng Lee, Vahab Iranmanesh
{"title":"Privacy and Security: How to Differentiate Them Using Privacy-Security Tree (PST) Classification","authors":"Jocelyn Chan Ming Ji, Hui Na Chua, Hong Seng Lee, Vahab Iranmanesh","doi":"10.1109/ICISSEC.2016.7885866","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885866","url":null,"abstract":"Privacy and security have been discussed in many occasions and in most cases, the importance that these two aspects play on the information system domain are mentioned often. Many times, research is carried out on the individual information security or privacy measures where it is commonly regarded with the focus on the particular measure or both privacy and security are regarded as a whole subject. However, there have been no attempts at establishing a proper method in categorizing any form of objects of protection. Through the review done on this paper, we would like to investigate the relationship between privacy and security and form a break down the aspects of privacy and security in order to provide better understanding through determining if a measure or methodology is security, privacy oriented or both. We would recommend that in further research, a further refined formulation should be formed in order to carry out this determination process. As a result, we propose a Privacy-Security Tree (PST) in this paper that distinguishes the privacy from security measures.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130863393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault Identification Tool Based on Deep Learning for Fault Big Data","authors":"Y. Tamura, Satoshi Ashida, S. Yamada","doi":"10.1109/ICISSEC.2016.7885852","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885852","url":null,"abstract":"Many open source software (OSS) are developed under the OSS projects all over the world. Then, the software faults detected in OSS projects are managed by the bug tracking systems. Also, many data sets are recorded on the bug tracking systems by many users and project members. In this paper, we propose the useful method based on the deep learning for the improvement activities of OSS reliability. In particular, we develop an application software for visualization of fault data recorded on OSS. Moreover, several numerical illustrations of the developed application software in the actual OSS project are shown in this paper. Furthermore, we discuss the analysis results based on the developed application software by using the fault data sets of actual OSS projects.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121554141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}