{"title":"Recombining TCP sessions based on finite state machine to detect cyber attackers","authors":"Wenchuan Yang, Zishuai Cheng, Baojiang Cui","doi":"10.1145/3309074.3309084","DOIUrl":"https://doi.org/10.1145/3309074.3309084","url":null,"abstract":"Attacks in the cyberspace is becoming more and more diverse and complex. Many attackers divide the payload in a TCP package into a set of IP packets. Though traditional attack detecting methods designed based on feature matching algorithm can only analyze a single IP packet, the cannot comprehensively analyze multi-packets. Therefore, the traditional methods cannot effectively detect the attackers' payload that are split up into multi-packets. Consequently, it is quite necessary to reassemble packets on the application layer and restore the payload that is distributed in multiple packets. Then, we can analyze the complete attacker's payload flexibly. In this work, we propose a TCP session bidirectional data flow reassembly method based the Finite State Machine (FSM). Besides, we evaluate the performance of our work using the Spark platform. Simulation results show that our method is of high accuracy and good performance in expansibility.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122229053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lightweight authentication for MQTT to improve the security of IoT communication","authors":"Ranbir Singh Bali, Fehmi Jaafar, P. Zavarsky","doi":"10.1145/3309074.3309081","DOIUrl":"https://doi.org/10.1145/3309074.3309081","url":null,"abstract":"A widely used application layer protocol for IoT communication is Message Queue Telemetry Transport (MQTT) protocol. The provision of security in MQTT protocol is an essential concern in IoT applications. In this paper, we show how the conventional secure MQTT protocol is vulnerable to cipher attack. Then, we present a novel approach to improve the MQTT security by providing lightweight authentication mechanism. The proposed approach is using chaotic algorithm with topic based self-key agreement and block cipher. Moreover, the empirical study is performed to measure the efficiency of proposed approach in Cooja simulated environment.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129887836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real walking on a virtual campus: a VR-based multimedia visualization and interaction system","authors":"Z. Li, Di Xu, Yanning Zhang","doi":"10.1145/3309074.3309112","DOIUrl":"https://doi.org/10.1145/3309074.3309112","url":null,"abstract":"The rapid development of virtual reality (VR) provides a revolutionary way for multimedia data visualization and interaction. Instead of sitting on a chair and playing with a controller, real walking gives the most natural experience when exploring the virtual world. However, considering both physiology and psychology factors, there are several challenges to achieve high fidelity when walking in a VR world with massive multimedia data. That is, the isometrical mapping is not feasible in most cases, as the real space can be completely different from the virtual world (usually smaller). Moreover, the sound is usually not consistent with visual cues when considering the directions. Therefore in this paper, we present a VR walking system that contains a huge virtual campus with extensive multimedia data, which combines 3D models, animations and stereo sound. To this end, we adopt a VR redirected walking method for the purpose of perception manipulation, and HRTF-based sound system for audio-visual consistency. By wearing a head-mounted display and walking in a small room tracked by our indoor localization algorithm, the user is able to freely explore the whole VR world with high fidelity.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126245322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An academic review of current industrial and commercial cyber security social engineering solutions","authors":"Hussain Aldawood, G. Skinner","doi":"10.1145/3309074.3309083","DOIUrl":"https://doi.org/10.1145/3309074.3309083","url":null,"abstract":"The study aims to assess popular awareness training solutions and techniques used by organizations to defend and mitigate cyber security social engineering threats. Social engineering threats are the most unpredicted threats an organization faces, leading to loss of confidential data, finances, intellectual property, and consumer credibility. Therefore, it is very important that an organization is well prepared to defend its information systems against social engineering threats. Literature in this domain presents various types of contemporary training and awareness solutions used at the corporate level to address social engineering threats, with the most prominent being reviewed in this study. Latest training methods identified in this study include serious games, gamification, virtual labs, tournaments, simulations, and the use of other modern applications. Similarly, current awareness programs that educate against social engineering threats including video streaming, compliances, theme-based trainings, awareness campaigns, and conferences are also included.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115073964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Jumbled passsteps: a hotspot guessing attack resistant graphical password authentication scheme based on the modified passmatrix method","authors":"Jerome P. Songcuan, Ariel M. Sison","doi":"10.1145/3309074.3309099","DOIUrl":"https://doi.org/10.1145/3309074.3309099","url":null,"abstract":"In today's fast paced growing technologies, user authentication plays a crucial role in the protection of data and private information from varied system attacks. Graphical-based password techniques have been proposed as a potential alternative to resolve security and usability limitations. However, most of the existing graphical password schemes like PassMatrix are vulnerable to random guess attacks based on hot-spot analyzing whereas some pass-images are relatively easier to guess because they are more memorable, obvious or unique. To overcome this problem, the researchers proposed the Jumbled PassSteps method. By replacing the single discretized image of the PassMatrix method into several independent images and applying a random grid traversal method, attackers cannot easily guess the original pass-image of the user even if they observed the log-in session. Because the acquisition of the one-time grid traversal steps is done with the use of earphones, the direction and number of traversals to be done in a particular session cannot be acquired by attacker even if it is camera recorded. Experimental results show that Jumbled PassSteps effectively overcomes hotspot guessing attacks and achieves better resistance to shoulder-surfing attacks.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128316255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Suhail Hamdan, Y. Fukumizu, T. Izumi, Hironori Yamauchi
{"title":"Improved face image super-resolution with restricted patch-searching area","authors":"Suhail Hamdan, Y. Fukumizu, T. Izumi, Hironori Yamauchi","doi":"10.1145/3309074.3309109","DOIUrl":"https://doi.org/10.1145/3309074.3309109","url":null,"abstract":"Recently, an example-based super-resolution (SR) method specifically for face image, which takes the correspondence of facial parts into consideration, was proposed. The method constructs a database of face-image patches with their positions from example images of normalized faces. Given a low-resolution (LR) image, the method generates an SR image by finding similar patches in the database and incorporating high-frequency component of the patches to the LR image. Since the method just divides an example image into patches, for example, 5x5 patches in five-pixels intervals, the SR process may misses the chance to have the patch of the finest position. The proposed method generates patches in one-pixel intervals to increase the chance. In order to cope with the massively increased size of the patch database, the proposed method restricts the area to search the patch candidates for each position. An experimental result shows the proposed method achieves better results than the previous in term of the peak signal-to-noise ratio (PSNR). Furthermore, the proposed method has reduced computational time by 90% compared to the previous.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131240096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electronic evidence preservation model based on blockchain","authors":"Yu Xiong, Jiang Du","doi":"10.1145/3309074.3309075","DOIUrl":"https://doi.org/10.1145/3309074.3309075","url":null,"abstract":"With the rapid development and application of the Internet, the amount of electronic data based on computer and computer network has exploded. Specific and effective electronic data play an increasingly important role in proving the facts of a case. The most important issue of electronic evidence is trust and security. However, electronic evidence is stored in the centralized database at present, and there are data security and trust problems. This paper proposes an electronic evidence preservation model based on blockchain to ensure the data safe and reliable.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"396 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123391735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artifact removal in radiological ultrasound images using selective and adaptive median filter","authors":"A. Nugroho, Risanuri Hidayat, H. A. Nugroho","doi":"10.1145/3309074.3309119","DOIUrl":"https://doi.org/10.1145/3309074.3309119","url":null,"abstract":"Among the existing modalities, ultrasound (US) imaging is mostly utilized to screening abnormalities such as effective used in radiology. Computer-aided diagnosis (CAD) has become a second opinion US reader to improve radiologist's diagnoses by applying appropriate techniques of image processing. The existences of manually induced artifacts, such as caliper marking, rendering and anatomical labeling are negatively affected the results of segmentation in CAD. Moreover improper suppression methods will increase the emergency of undesired artifacts which degrading the quality and clinical applicability of US images. This paper presents the utility of selective and adaptive median filter for manually induced artifacts removal with preserving image features. The experimental results indicate that the proposed method is appropriate to remove artifacts in radiological US images, both in vision and quantitative measurements.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121155529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dead-end free geographic routing protocol for WSN","authors":"Venkatesh, Ananda Kumar Subramanian","doi":"10.1145/3309074.3309086","DOIUrl":"https://doi.org/10.1145/3309074.3309086","url":null,"abstract":"The routing of data packets in Wireless Sensor Networks(WSNs) is treated as one of the important aspects. The deadend phenomenon (also known as the \"local maximum\" problem) poses major difficulties when performing geographic forwarding in wireless sensor network since whenever a packet encounters a dead-end, additional overheads must be paid to forward the packet to the destination via alternative route. In this paper, the proposed algorithm route the data packets around the connectivity holes region. The proposed algorithm consists of two phases; the detection of dead node is performed in first phase, avoidance of connectivity holes and selection of forwarding nodes are performed in second phase of algorithm. The residual energy, packet delivery ratio and distance are considered while selecting forwarding nodes. The proposed algorithm ensures that the data packets are forwarded in an energy efficient manner and improves PDR. Through extensive experiments shows that our algorithm performs better than the existing Protocol [10] in terms of energy consumption, network life time, packet delivery ratio and energy consumed per packet.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126375410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dyala R. Ibrahim, Rosni Abdullah, J. Teh, Bisan Alsalibi
{"title":"Authentication for ID cards based on colour visual cryptography and facial recognition","authors":"Dyala R. Ibrahim, Rosni Abdullah, J. Teh, Bisan Alsalibi","doi":"10.1145/3309074.3309077","DOIUrl":"https://doi.org/10.1145/3309074.3309077","url":null,"abstract":"Modern identification cards can be used for a myriad of applications such as electronic passports, ATM cards or payment cards for public transportation. Despite their ease of use, user authentication is an important factor that must be taken into consideration. In addition to the use of passwords, biometric data such as fingerprints or iris images can also be included as part of a multi-factor authentication system. However, these methods require secure storage of the biometric template and active participation from the user. In this paper, we propose a new method of authentication for identification cards based on colour visual cryptography and facial recognition. A colour image of the user will be encrypted using visual cryptography and split into two share images, one of which will be stored on the database and the other will be stored in the card. When the card is placed onto a sensor, the two shares will overlap to uncover the original image. The recovered image is then fed into a trained facial recognition algorithm to verify the user's identity. The proposed method is evaluated based on recognition rate and runtime. Experimental results indicate the feasibility of the proposed method for practical application and can be used as a starting point for future work in the area.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115177390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}