Proceedings of the 3rd International Conference on Cryptography, Security and Privacy最新文献

筛选
英文 中文
Recombining TCP sessions based on finite state machine to detect cyber attackers 基于有限状态机重组TCP会话检测网络攻击者
Wenchuan Yang, Zishuai Cheng, Baojiang Cui
{"title":"Recombining TCP sessions based on finite state machine to detect cyber attackers","authors":"Wenchuan Yang, Zishuai Cheng, Baojiang Cui","doi":"10.1145/3309074.3309084","DOIUrl":"https://doi.org/10.1145/3309074.3309084","url":null,"abstract":"Attacks in the cyberspace is becoming more and more diverse and complex. Many attackers divide the payload in a TCP package into a set of IP packets. Though traditional attack detecting methods designed based on feature matching algorithm can only analyze a single IP packet, the cannot comprehensively analyze multi-packets. Therefore, the traditional methods cannot effectively detect the attackers' payload that are split up into multi-packets. Consequently, it is quite necessary to reassemble packets on the application layer and restore the payload that is distributed in multiple packets. Then, we can analyze the complete attacker's payload flexibly. In this work, we propose a TCP session bidirectional data flow reassembly method based the Finite State Machine (FSM). Besides, we evaluate the performance of our work using the Spark platform. Simulation results show that our method is of high accuracy and good performance in expansibility.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122229053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lightweight authentication for MQTT to improve the security of IoT communication MQTT轻量级认证,提高物联网通信安全性
Ranbir Singh Bali, Fehmi Jaafar, P. Zavarsky
{"title":"Lightweight authentication for MQTT to improve the security of IoT communication","authors":"Ranbir Singh Bali, Fehmi Jaafar, P. Zavarsky","doi":"10.1145/3309074.3309081","DOIUrl":"https://doi.org/10.1145/3309074.3309081","url":null,"abstract":"A widely used application layer protocol for IoT communication is Message Queue Telemetry Transport (MQTT) protocol. The provision of security in MQTT protocol is an essential concern in IoT applications. In this paper, we show how the conventional secure MQTT protocol is vulnerable to cipher attack. Then, we present a novel approach to improve the MQTT security by providing lightweight authentication mechanism. The proposed approach is using chaotic algorithm with topic based self-key agreement and block cipher. Moreover, the empirical study is performed to measure the efficiency of proposed approach in Cooja simulated environment.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129887836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Real walking on a virtual campus: a VR-based multimedia visualization and interaction system 虚拟校园中真实行走:基于vr的多媒体可视化交互系统
Z. Li, Di Xu, Yanning Zhang
{"title":"Real walking on a virtual campus: a VR-based multimedia visualization and interaction system","authors":"Z. Li, Di Xu, Yanning Zhang","doi":"10.1145/3309074.3309112","DOIUrl":"https://doi.org/10.1145/3309074.3309112","url":null,"abstract":"The rapid development of virtual reality (VR) provides a revolutionary way for multimedia data visualization and interaction. Instead of sitting on a chair and playing with a controller, real walking gives the most natural experience when exploring the virtual world. However, considering both physiology and psychology factors, there are several challenges to achieve high fidelity when walking in a VR world with massive multimedia data. That is, the isometrical mapping is not feasible in most cases, as the real space can be completely different from the virtual world (usually smaller). Moreover, the sound is usually not consistent with visual cues when considering the directions. Therefore in this paper, we present a VR walking system that contains a huge virtual campus with extensive multimedia data, which combines 3D models, animations and stereo sound. To this end, we adopt a VR redirected walking method for the purpose of perception manipulation, and HRTF-based sound system for audio-visual consistency. By wearing a head-mounted display and walking in a small room tracked by our indoor localization algorithm, the user is able to freely explore the whole VR world with high fidelity.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126245322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An academic review of current industrial and commercial cyber security social engineering solutions 当前工业和商业网络安全社会工程解决方案的学术综述
Hussain Aldawood, G. Skinner
{"title":"An academic review of current industrial and commercial cyber security social engineering solutions","authors":"Hussain Aldawood, G. Skinner","doi":"10.1145/3309074.3309083","DOIUrl":"https://doi.org/10.1145/3309074.3309083","url":null,"abstract":"The study aims to assess popular awareness training solutions and techniques used by organizations to defend and mitigate cyber security social engineering threats. Social engineering threats are the most unpredicted threats an organization faces, leading to loss of confidential data, finances, intellectual property, and consumer credibility. Therefore, it is very important that an organization is well prepared to defend its information systems against social engineering threats. Literature in this domain presents various types of contemporary training and awareness solutions used at the corporate level to address social engineering threats, with the most prominent being reviewed in this study. Latest training methods identified in this study include serious games, gamification, virtual labs, tournaments, simulations, and the use of other modern applications. Similarly, current awareness programs that educate against social engineering threats including video streaming, compliances, theme-based trainings, awareness campaigns, and conferences are also included.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115073964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Jumbled passsteps: a hotspot guessing attack resistant graphical password authentication scheme based on the modified passmatrix method 混乱密码步骤:一种基于改进的密码矩阵方法的抗热点猜测攻击图形密码认证方案
Jerome P. Songcuan, Ariel M. Sison
{"title":"Jumbled passsteps: a hotspot guessing attack resistant graphical password authentication scheme based on the modified passmatrix method","authors":"Jerome P. Songcuan, Ariel M. Sison","doi":"10.1145/3309074.3309099","DOIUrl":"https://doi.org/10.1145/3309074.3309099","url":null,"abstract":"In today's fast paced growing technologies, user authentication plays a crucial role in the protection of data and private information from varied system attacks. Graphical-based password techniques have been proposed as a potential alternative to resolve security and usability limitations. However, most of the existing graphical password schemes like PassMatrix are vulnerable to random guess attacks based on hot-spot analyzing whereas some pass-images are relatively easier to guess because they are more memorable, obvious or unique. To overcome this problem, the researchers proposed the Jumbled PassSteps method. By replacing the single discretized image of the PassMatrix method into several independent images and applying a random grid traversal method, attackers cannot easily guess the original pass-image of the user even if they observed the log-in session. Because the acquisition of the one-time grid traversal steps is done with the use of earphones, the direction and number of traversals to be done in a particular session cannot be acquired by attacker even if it is camera recorded. Experimental results show that Jumbled PassSteps effectively overcomes hotspot guessing attacks and achieves better resistance to shoulder-surfing attacks.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128316255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improved face image super-resolution with restricted patch-searching area 改进了人脸图像的超分辨率,限制了补丁搜索区域
Suhail Hamdan, Y. Fukumizu, T. Izumi, Hironori Yamauchi
{"title":"Improved face image super-resolution with restricted patch-searching area","authors":"Suhail Hamdan, Y. Fukumizu, T. Izumi, Hironori Yamauchi","doi":"10.1145/3309074.3309109","DOIUrl":"https://doi.org/10.1145/3309074.3309109","url":null,"abstract":"Recently, an example-based super-resolution (SR) method specifically for face image, which takes the correspondence of facial parts into consideration, was proposed. The method constructs a database of face-image patches with their positions from example images of normalized faces. Given a low-resolution (LR) image, the method generates an SR image by finding similar patches in the database and incorporating high-frequency component of the patches to the LR image. Since the method just divides an example image into patches, for example, 5x5 patches in five-pixels intervals, the SR process may misses the chance to have the patch of the finest position. The proposed method generates patches in one-pixel intervals to increase the chance. In order to cope with the massively increased size of the patch database, the proposed method restricts the area to search the patch candidates for each position. An experimental result shows the proposed method achieves better results than the previous in term of the peak signal-to-noise ratio (PSNR). Furthermore, the proposed method has reduced computational time by 90% compared to the previous.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131240096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Electronic evidence preservation model based on blockchain 基于区块链的电子证据保存模型
Yu Xiong, Jiang Du
{"title":"Electronic evidence preservation model based on blockchain","authors":"Yu Xiong, Jiang Du","doi":"10.1145/3309074.3309075","DOIUrl":"https://doi.org/10.1145/3309074.3309075","url":null,"abstract":"With the rapid development and application of the Internet, the amount of electronic data based on computer and computer network has exploded. Specific and effective electronic data play an increasingly important role in proving the facts of a case. The most important issue of electronic evidence is trust and security. However, electronic evidence is stored in the centralized database at present, and there are data security and trust problems. This paper proposes an electronic evidence preservation model based on blockchain to ensure the data safe and reliable.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"396 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123391735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Artifact removal in radiological ultrasound images using selective and adaptive median filter 利用选择性和自适应中值滤波器去除放射超声图像中的伪影
A. Nugroho, Risanuri Hidayat, H. A. Nugroho
{"title":"Artifact removal in radiological ultrasound images using selective and adaptive median filter","authors":"A. Nugroho, Risanuri Hidayat, H. A. Nugroho","doi":"10.1145/3309074.3309119","DOIUrl":"https://doi.org/10.1145/3309074.3309119","url":null,"abstract":"Among the existing modalities, ultrasound (US) imaging is mostly utilized to screening abnormalities such as effective used in radiology. Computer-aided diagnosis (CAD) has become a second opinion US reader to improve radiologist's diagnoses by applying appropriate techniques of image processing. The existences of manually induced artifacts, such as caliper marking, rendering and anatomical labeling are negatively affected the results of segmentation in CAD. Moreover improper suppression methods will increase the emergency of undesired artifacts which degrading the quality and clinical applicability of US images. This paper presents the utility of selective and adaptive median filter for manually induced artifacts removal with preserving image features. The experimental results indicate that the proposed method is appropriate to remove artifacts in radiological US images, both in vision and quantitative measurements.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121155529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Dead-end free geographic routing protocol for WSN 无线传感器网络的无死端地理路由协议
Venkatesh, Ananda Kumar Subramanian
{"title":"Dead-end free geographic routing protocol for WSN","authors":"Venkatesh, Ananda Kumar Subramanian","doi":"10.1145/3309074.3309086","DOIUrl":"https://doi.org/10.1145/3309074.3309086","url":null,"abstract":"The routing of data packets in Wireless Sensor Networks(WSNs) is treated as one of the important aspects. The deadend phenomenon (also known as the \"local maximum\" problem) poses major difficulties when performing geographic forwarding in wireless sensor network since whenever a packet encounters a dead-end, additional overheads must be paid to forward the packet to the destination via alternative route. In this paper, the proposed algorithm route the data packets around the connectivity holes region. The proposed algorithm consists of two phases; the detection of dead node is performed in first phase, avoidance of connectivity holes and selection of forwarding nodes are performed in second phase of algorithm. The residual energy, packet delivery ratio and distance are considered while selecting forwarding nodes. The proposed algorithm ensures that the data packets are forwarded in an energy efficient manner and improves PDR. Through extensive experiments shows that our algorithm performs better than the existing Protocol [10] in terms of energy consumption, network life time, packet delivery ratio and energy consumed per packet.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126375410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Authentication for ID cards based on colour visual cryptography and facial recognition 基于彩色视觉密码和人脸识别的身份证认证
Dyala R. Ibrahim, Rosni Abdullah, J. Teh, Bisan Alsalibi
{"title":"Authentication for ID cards based on colour visual cryptography and facial recognition","authors":"Dyala R. Ibrahim, Rosni Abdullah, J. Teh, Bisan Alsalibi","doi":"10.1145/3309074.3309077","DOIUrl":"https://doi.org/10.1145/3309074.3309077","url":null,"abstract":"Modern identification cards can be used for a myriad of applications such as electronic passports, ATM cards or payment cards for public transportation. Despite their ease of use, user authentication is an important factor that must be taken into consideration. In addition to the use of passwords, biometric data such as fingerprints or iris images can also be included as part of a multi-factor authentication system. However, these methods require secure storage of the biometric template and active participation from the user. In this paper, we propose a new method of authentication for identification cards based on colour visual cryptography and facial recognition. A colour image of the user will be encrypted using visual cryptography and split into two share images, one of which will be stored on the database and the other will be stored in the card. When the card is placed onto a sensor, the two shares will overlap to uncover the original image. The recovered image is then fed into a trained facial recognition algorithm to verify the user's identity. The proposed method is evaluated based on recognition rate and runtime. Experimental results indicate the feasibility of the proposed method for practical application and can be used as a starting point for future work in the area.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115177390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信