{"title":"Research on executive control strategy of mimic web defense gateway","authors":"Chen Shuangxi, Xu Xiahui, Wu Chunming, Jiang Xinyue","doi":"10.1145/3309074.3309089","DOIUrl":"https://doi.org/10.1145/3309074.3309089","url":null,"abstract":"The present pattern of Cyberspace Security remains vulnerable to attacks but difficult to defend. Traditional defensive measures are mainly detecting and blocking, with a certain degree of passivity and hysteresis. As a game-changer, mimic defense [1] will definitely bring revolutionary changes to this pattern. DHR [2] (Dynamic Heterogeneous Redundancy) is the basic architecture of mimic defense. This paper analyses effectiveness of the security of this architecture and the impact of key parameters on it, based on mimic defense DHR. To improve security of executive sets, executive scheduling method based on K-means clustering is devised in this paper, making the maximum heterogeneous degree possible and guaranteeing the randomness of scheduling algorithm, in the result, the difficulty of attacks increases. Furthermore, this paper proposes a centralized resource allocation method for each executive based on feedback control [3], targeting evolving the system by reducing response time of executive sets. In the end of the dissertation, the actual deployment and test verification are carried out based on the mimic Web server [4] platform.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125847512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Danlami Muktar, Sapiee Jamel, S. N. Ramli, M. M. Deris
{"title":"2D legendre wavelet filter for iris recognition feature extraction","authors":"Danlami Muktar, Sapiee Jamel, S. N. Ramli, M. M. Deris","doi":"10.1145/3309074.3309090","DOIUrl":"https://doi.org/10.1145/3309074.3309090","url":null,"abstract":"In iris recognition system, the feature extraction is the most important stages where the iris unique feature is extracted. Several methods of achieving this have been proposed in order to extract the distinct features that are unique to each individual. The aim of this research is to proposed a new Legendre wavelet filter that will decompose the iris data and extract the unique pattern for the iris recognition system. The research considers using wavelet because wavelet are the most suitable means of image processing in general. The Legendre filter create show a very fine result of a decomposed iris image for classification.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128399773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced key generation algorithm of hashing message authentication code","authors":"Enrique G. Abad, Ariel M. Sison","doi":"10.1145/3309074.3309098","DOIUrl":"https://doi.org/10.1145/3309074.3309098","url":null,"abstract":"The keyed-HMAC is a security tool primarily used to ensure authentication and data integrity in information systems and computer networks. In this study, the authors proposed a new key generation using HMAC-MD5 using XOR and circular left shifting. Findings reveal that the proposed method could generate a key with only 420 ms. As to avalanche effect, it achieved 55.05% which passed the criteria of encryption. Also, the approximate time to successfully retrieve the encrypted key is 3.2845E+62 years. This means that the hash value cannot be easily cracked or hacked using powerful brute-force attack. Results also show that the performance of the proposed method is better than the existing methods. Thus, improved its security level compared to other methods.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127974005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Rajendrakumar, V. Parvati, Rajashekarappa, P. Divakarachari
{"title":"Automation of irrigation system through embedded computing technology","authors":"S. Rajendrakumar, V. Parvati, Rajashekarappa, P. Divakarachari","doi":"10.1145/3309074.3309108","DOIUrl":"https://doi.org/10.1145/3309074.3309108","url":null,"abstract":"Dearth of fresh water worldwide has given rise to solemn alarms since a decade. Economical administration of water resources plays a critical role when it is mainly with reference to the agriculture zone. Irrigation is generally functions along with canal plan by which water is pumped up into fields once at regular period of time according to farmers habitual ways without appropriate measurements with none feedback of water level in field. This kind of irrigation method will definitely hinder the crop growth and health and produces a poor yield as a result of some crops area component too susceptible to water content in soil. The ingenuous ICT technique presents an insolent system that uses minimum value soil wetness sensing element and temperature sensing element to manage facility in water shortage regions. The sensor, those vocations on the standard of moisture reliant resistance amendment between two points within the soil, is invented with the help of low cost materials and ways. Moisture and temperature knowledge is fetched from a sensing element node is distributed through an Arduino to a centralized server that controls facility. An automaton application is developed to envision the daily wetness and temperature knowledge. Moreover, the planned wetness sensing and temperature sensing ways have the power to be incorporated into machine-controlled which is automatic irrigation theme and perform automated, exactness agriculture in conjunction with de-centralized water management system. Application results illustrate that system through the embedded controlled technology which makes it complete intelligent irrigation, enhance the agricultural produce and improve soil health by irrigation, the water is used fruitfully and irrigation system automation is achieved mostly in all aspects.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130962149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Rabbani, S. Sultana, Md.Nazmul Hasan, Salem Quddus Fahad, J. Uddin
{"title":"Person identification using SURF features of dental radiograph","authors":"G. Rabbani, S. Sultana, Md.Nazmul Hasan, Salem Quddus Fahad, J. Uddin","doi":"10.1145/3309074.3309115","DOIUrl":"https://doi.org/10.1145/3309074.3309115","url":null,"abstract":"This paper presents a model that is designed to identify people based on shapes and appearances of their teeth. In the proposed model, wiener filtering is used to reduce noise and provide smooth image. This filtered image is used in canny edge detection algorithm where image's edge is defined through Gaussian Filtering and edge thresholding which determines the region of the shape that represents binary pixel value. This pixel value can be used in image identification. Furthermore, SURF algorithm is used to define interest points. Given a query image (i.e., Postmortem radiograph), each tooth is matched with the archived teeth in the database (Antemortem radiographs). The experimental results are based on a database of 12 panoramic x-ray images. The experimental results show that the proposed method successfully identifies the individuals based on their dental radiographs.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"633 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131652057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Widya Wirachantika, A. Barmawi, Bambang Ari Wahyudi
{"title":"Strengthening fawkescoin against double spending attack using merkle tree","authors":"Widya Wirachantika, A. Barmawi, Bambang Ari Wahyudi","doi":"10.1145/3309074.3309105","DOIUrl":"https://doi.org/10.1145/3309074.3309105","url":null,"abstract":"Cryptocurrency is a digital currency with cryptographic security so that it is not easily to be faked. Recently cryptocurrency is widely used for transactions. Therefore, preserving its integrity and security is important. The technology underlying the digital currency is the Blockchain, as applied to Fawkescoin. But for securing the transaction, fawkescoin has a disadvantage when the fork occurs because it can provide opportunity to conduct double spending attack. To overcome this problem, Merkle tree proposed by applying DSA digital signatures. The application of DSA on Merkle tree is used to verify data without knowing the contents of the data. Based on the experiment results and analysis, the security of the proposed method can prevent fawkescoin against double spending attack on transactions when forking occurs than the previous method.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123648873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Divakarachari, Kiran, P. Rashmi, C. SupriyaM., Rajashekarappa, T. PandurangaH.
{"title":"Controlled partial image encryption based on LSIC and chaotic map","authors":"P. Divakarachari, Kiran, P. Rashmi, C. SupriyaM., Rajashekarappa, T. PandurangaH.","doi":"10.1145/3309074.3309107","DOIUrl":"https://doi.org/10.1145/3309074.3309107","url":null,"abstract":"Partial image encryption plays a vital role in the field of medical image encryption, because small amount of encryption leads to high security with low computation complexity. This paper presents controlled partial image encryption using LSIC and chaotic map. It consists of two methods. In method-1 image is divided into 16x16 blocks. Entropy of each block is compared with threshold entropy from entropy selection table. If entropy of each block is greater than predefined threshold entropy then that block is XORed with 16x16 random block generated by converting each row of LSIC into 16x16 block. In method-2 entropy of block greater than predefined threshold entropy then pixels within that block is shuffled using chaotic map. Based on different threshold entropy values different partial encrypted images are obtained. From the experimental results shows that proposed methods can controlled amount of encryption as per the requirements.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122008517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security maturity model of web applications for cyber attacks","authors":"Renato Rojas, Ana Muedas, D. Mauricio","doi":"10.1145/3309074.3309096","DOIUrl":"https://doi.org/10.1145/3309074.3309096","url":null,"abstract":"Bearing in mind that the projections made for the area of information security point to an increase in attacks on the health sector, added to the lack or little diffusion of security maturity models that allow organizations to know the status of their website in terms of security and that the existing models lack a post-evaluation monitoring, it is necessary to propose a model of security maturity of web applications against cyber-attacks, oriented to the health sector, which is simple to apply. The proposed model will be based on the International Professional Practice Framework methodology and will include the main vulnerabilities published by the Open Web Application Security Project to propose attacks that identify the weakness of the evaluated web system, so that the client company has the possibility to reinforce its weaknesses. Guides will also be proposed to select strategies to improve critical points from a security perspective. As a result of the validation, it was found that, of the 14 tests applied, 5 were approved, positioning the web at level 3 of maturity, which means that there are validations in the structure of the web; however, they are partial or inefficient.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126880701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing MD5 hash algorithm using symmetric key encryption","authors":"Aman Shakya, Nitesh Karna","doi":"10.1145/3309074.3309087","DOIUrl":"https://doi.org/10.1145/3309074.3309087","url":null,"abstract":"Message integrity and authenticity is crucial with ever increasing network communication. Cryptographic Hash Functions are main building block of message integrity. Many types of hash functions are being used and developed. In this paper, a new keyed hash function is being proposed and described. This proposed algorithm produces a hash code of 128 bits for an arbitrary length of input. The function uses a key during hashing, so that any intruder who does not know the key cannot forge the hash code, and, thus it satisfies the purpose of security, authentication and integrity for a message in network. The paper discusses the algorithm on the function design, its security aspects and implementation details.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125173758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applications of machine learning in cryptography: a survey","authors":"M. Alani","doi":"10.1145/3309074.3309092","DOIUrl":"https://doi.org/10.1145/3309074.3309092","url":null,"abstract":"Machine learning techniques have had a long list of applications in recent years. However, the use of machine learning in information and network security is not new. Machine learning and cryptography have many things in common. The most apparent is the processing of large amounts of data and large search spaces. In its varying techniques, machine learning has been an interesting field of study with massive potential for application. In the past three decades, machine learning techniques, whether supervised or unsupervised, have been applied in cryptographic algorithms, cryptanalysis, steganography, among other data-security-related applications. This paper presents an updated survey of applications of machine learning techniques in cryptography and cryptanalysis. The paper summarizes the research done in these areas and provides suggestions for future directions in research.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131282968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}