{"title":"Learning Environment Containerization of Machine Leaning for Cybersecurity","authors":"H. Shahriar, K. Qian, Hao Zhang","doi":"10.1109/COMPSAC48688.2020.0-105","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-105","url":null,"abstract":"Machine learning plays a critical role in detecting and preventing in the field of cybersecurity. However, many students have difficulties on configuring the appropriate coding environment and retrieving datasets on their own computers, which, to some extent, wastes valuable time for learning core contents of machine learning and cybersecurity. In this paper, we propose an approach with learning environment containerization of machine learning algorithm and dataset. This will help students focus more on learning contents and have valuable hand-on experience through Docker container and get rid of the trouble of configuration coding environment and retrieve dataset. This paper provides an overview of case-based hands-on lab with logistic regression algorithm for credit card fraud prediction.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115787417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Moitrayee Chatterjee, Prerit Datta, Faranak Abri, A. Namin, Keith S. Jones
{"title":"Cloud: A Platform to Launch Stealth Attacks","authors":"Moitrayee Chatterjee, Prerit Datta, Faranak Abri, A. Namin, Keith S. Jones","doi":"10.1109/COMPSAC48688.2020.00-33","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00-33","url":null,"abstract":"Cloud computing offers users scalable platforms and low resource cost. At the same time, the off-site location of the resources of this service model makes it more vulnerable to certain types of adversarial actions. Cloud computing has not only gained major user base, but also, it has the features that attackers can leverage to remain anonymous and stealth. With convenient access to data and technology, cloud has turned into an attack platform among other utilization. This paper reports our study to show that cyber attackers heavily abuse the public cloud platforms to setup their attack environments and launch stealth attacks. The paper first reviews types of attacks launched through cloud environment. It then reports case studies through which the processes of launching cyber attacks using clouds are demonstrated. We simulated various attacks using a virtualized environment, similar to cloud platforms, to identify the possible countermeasures from a defender's perspective, and thus to provide implications for the cloud service providers.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115833477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Handwritten Signature Authentication Using Smartwatch Motion Sensors","authors":"Gen Li, Hiroyuki Sato","doi":"10.1109/COMPSAC48688.2020.00-28","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00-28","url":null,"abstract":"The trade-off between security and ease of use tends to make passwords not necessarily as secure as designers expected. Biometric authentication has been receiving extensive attention and is increasingly used every day, of which signature authentication is one of the most commonly used methods due to the stability of signatures and the high difficulty of imitation. Current solutions often rely on dedicated digitizer consisting of graphic tablets and smartpens. The growth of commercial hand-worn devices such as smartwatches provides an alternative way to digitize signatures. Therefore, it is valuable to explore the feasibility of capturing the uniqueness and stability using hand-worn devices. In this paper, we propose a practical authentication method using smartwatch motion sensor data. It can distinguish whether an unknown signature belongs to the individual that they claimed to be or not. We firstly introduce Siamese Recurrent Neural Networks (RNNs) to deal with smartwatch motion sensor data of signing processes, which can save the task of manual feature design and improves system security. Our method uses a global model instead of a personalized one. Therefore, the trained system dose not require forged signatures from new users. After providing a set of genuine signatures during the enrollment phase, their signatures are irreversibly transformed into representation vectors, which will be used for authentication later while ensuring security. For experiment work, we collected 400 signature-related motion sensor data from 20 subjects and aligned them into 2990 pairs. Our method was evaluated using the collected data and outperformed comparable related work. We achieved an EER of 0.78%.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"158 6 Pt 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116401066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anju Thomas, M. HarikrishnanP., P. Ponnusamy, V. Gopi
{"title":"Moving Vehicle Candidate Recognition and Classification Using Inception-ResNet-v2","authors":"Anju Thomas, M. HarikrishnanP., P. Ponnusamy, V. Gopi","doi":"10.1109/COMPSAC48688.2020.0-207","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-207","url":null,"abstract":"Vehicle detection and classification are important tasks in the automatic traffic monitoring system. The proposed work focuses on vehicle detection and classification. Vehicle detection is carried out using the combination of dense optical flow method and integrated binary projection profile. Inception-ResNet-v2 is used as a feature extraction technique and extracted features are fed to two different classifiers such as Support Vector Machine and Random Forest to classify the vehicle type. The recognition performance of Inception-ResNet-v2 with these classifiers is significantly high and the proposed approach obtained an output accuracy as 99.89% and 98.615% in Support Vector Machine and Random forest respectively.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116713277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Attack Detection Performance in NIDS Using GAN","authors":"Dongyang Li, Daisuke Kotani, Y. Okabe","doi":"10.1109/COMPSAC48688.2020.0-162","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-162","url":null,"abstract":"Nowadays, various methods are proposed to build effective anomaly-based Network Intrusion Detection System (NIDS). However, malicious packets are extremely less than normal packets and this class imbalance problem will result in low performance of attack detection. In this study, we have proposed a new hybrid oversampling model using GAN to improve attack detection performance in anomaly-based NIDS. It contains three main steps: feature extraction by Information Gain and PCA, data clustering by DBSCAN and data generation by WGAN-DIV. For performance evaluation, three HTTP only datasets: NSL-KDD-HTTP, UNSW-NB15-HTTP and Kyoto2006-Plus-HTTP are used. Six machine learning methods are utilized as anomaly-based NIDS and SMOTE is also used for comparison. Our model with XGBoost has achieved best F1-score in these three datasets from the results.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116641596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jonas Roessel, M. Knoell, J. Hofmann, Ricardo Buettner
{"title":"A Systematic Literature Review of Practical Virtual and Augmented Reality Solutions in Surgery","authors":"Jonas Roessel, M. Knoell, J. Hofmann, Ricardo Buettner","doi":"10.1109/COMPSAC48688.2020.0-204","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-204","url":null,"abstract":"From a strong practical point of view, we offer an overview of virtual and augmented reality solutions in medicine. We thus analyzed practical and industrial work included in peer-reviewed articles and conference proceedings.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"296 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114307697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Centralized Control of Account Migration at Single Sign-On in Shibboleth","authors":"Satsuki Nishioka, Y. Okabe","doi":"10.1109/COMPSAC48688.2020.00-27","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00-27","url":null,"abstract":"Single Sign-On (SSO) is adopted to use multiple services with a single log-in in the Internet. However, when a user tries to change the identity provider (IdP) which is responsible for authenticating of the user, he needs to release the binding between the log-in account on the migration-source IdP and his service account on each service provider (SP), and needs to set a new binding between the account on the migration-destination IdP and the service account on the SP. There is no common migration system to support migration using the SSO function. In this research, we especially focus on Shibboleth's function as an SSO service. And we propose a protocol to migrate accounts of a user on multiple SPs at once using an attribute provider (AP) in SSO environment. Also we implement the mechanism as an open source software using SimpleSAMLphp.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116138403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cache-Sharing Distributed Service Registry for Highly Dynamic V2X Environments","authors":"HyeongCheol Moon, Kyeong-Deok Baek, In-Young Ko","doi":"10.1109/COMPSAC48688.2020.0-109","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-109","url":null,"abstract":"In highly dynamic IoT environments such as Vehicle-to-Everything (V2X), discovering and providing Internet of Things (IoT) services to users is a challenging problem because the environments alter too quickly and unpredictably. For a fast and effective service discovery in a highly dynamic environment, we propose a cached service registry on mobile entities along with new metrics for evaluating the effectiveness of service discoveries. We conducted an experiment on a simulated V2X environment, and showed that both the rate of finding accessible services and the utilization of services can be improved comparing to the traditional service discovery method.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114770138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Affan Yasin, R. Fatima, Lin Liu, Jianmin Wang, Raian Ali
{"title":"Understanding Social Engineers Strategies from the Perspective of Sun-Tzu Philosophy","authors":"Affan Yasin, R. Fatima, Lin Liu, Jianmin Wang, Raian Ali","doi":"10.1109/COMPSAC48688.2020.00045","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00045","url":null,"abstract":"Human remains susceptible to manipulations, and social engineers are expert of these techniques. To better understand the attack and defense strategies of social engineering attack, there is a need to map social engineering strategies with the war strategies. We can find plenty of war strategist and books on war strategies. By mapping the knowledge, we may get unique ways of defense and can further identify social engineering attack patterns. In this study, we have mapped the principles suggested by Sun-Tzu with social engineering attacks and further mentioned the initial results (by showing examples for each case). We aim to extend this work and further verify the effectiveness of this strategy in near future.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127154116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WTC^2: Impact-Aware Threat Analysis for Water Treatment Centers","authors":"Amarjit Datta, M. Rahman, H. Shahriar","doi":"10.1109/COMPSAC48688.2020.0-206","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-206","url":null,"abstract":"A water treatment center (WTC) removes contaminants and unwanted components from the water and makes the water more acceptable to the end-users. A modern WTC is equipped with different water sensors and uses a combination of wired/wireless communication network. During the water treatment process, controllers periodically collect sensor measurements and make critical operational decisions. Since accuracy is vital, a WTC also uses different data validation mechanisms to validate the incoming sensor measurements. However, like any other cyber-physical system, water treatment facilities are prone to cyberattacks, and an intelligent adversary can alter the sensors measurements stealthily, and corrupt the water treatment process. In this work, we propose WTC Checker (WTC2), an impact-aware formal analysis framework that demonstrates the impact of stealthy false data injection attacks on the water treatment sensors. Through our work, we demonstrate that if an adversary has sufficient access to sensor measurements and can evade the data validation process, he/she can compromise the sensors measurements, change the water disinfectant contact time, and inflict damage to the clean water production process. We model this attack as a constraint satisfaction problem (CSP) and encode it using Satisfiability Modulo Theories (SMT). We evaluate the proposed framework for its threat analysis capability as well as its scalability by executing experiments on different synthetic test cases.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125131469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}