By Topic

Internet Monitoring and Protection, 2009. ICIMP '09. Fourth International Conference on

Date 24-28 May 2009

Filter Results

Displaying Results 1 - 25 of 34
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (319 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (10 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (178 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s):viii - ix
    Request permission for commercial reuse | PDF file iconPDF (70 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2009, Page(s):x - xii
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s):xiii - xv
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Effective Change Detection in Large Repositories of Unsolicited Traffic

    Publication Year: 2009, Page(s):1 - 6
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    When monitoring unsolicited network traffic automated detection and characterization of abrupt changes in the traffics statistical properties is important. These abrupt changes can either be due to a single or multiple anomalous activities taking place at the same time. The start of a new anomalous activity while another anomalous activity is in operation will result in a new change nested within ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Technique for Detecting New Attacks in Low-Interaction Honeypot Traffic

    Publication Year: 2009, Page(s):7 - 13
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    Honeypots are flexible security tools for gathering artefacts associated with a variety of Internet attack activities. While existing work on honeypot traffic analysis focuses mainly on identifying existing attacks, this paper describes a technique for detecting new attacks based on principal component analysis. The proposed technique requires no prior knowledge of attack types and has low computa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Framework for Zombie Detection Using Neural Networks

    Publication Year: 2009, Page(s):14 - 20
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (179 KB) | HTML iconHTML

    One of the most important threats to personal and corporate Internet security is the proliferation of zombie PCs operating as an organized network. Zombie detection is currently performed at the host level and/or network level, but these options have some important drawbacks: antivirus, anti-spyware and personal firewalls are ineffective in the detection of hosts that are compromised via new or ta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable and Density-Aware Measurement Strategies for Overlay Networks

    Publication Year: 2009, Page(s):21 - 26
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (530 KB) | HTML iconHTML

    In overlay networks, when we consider the effective and accurate measurement of underlay IP network between overlay nodes, it is important to take care the density of the overlay nodes in the network. In this paper, we propose the measurement strategy on the overlay networks which dramatically reduces the number of required measurement tasks for obtaining the up-to-date characteristics of full-mes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Developing Secure Video Surveillance Systems over IP

    Publication Year: 2009, Page(s):27 - 33
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB) | HTML iconHTML

    A framework of three attributes for video surveillance systems is underlined: availability, accessibility and authenticity. Under this framework, a scenario in which surveillance cameras can be accessed by remote devices, such as mobile phones, PDAs, over IP is addressed. Some security drawbacks of an off-the-shelf product are depicted and a new solution is proposed which uses cryptographic authen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of Social Networks in Email Communication

    Publication Year: 2009, Page(s):34 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (699 KB) | HTML iconHTML

    In this paper, we perform an empirical analysis of email traffic logs obtained from a large university to better understand the development of social networks. We analyzed data containing records of emails sent over a period of 10 months - the largest dataset we are aware of. We study the long term evolution of social networks on real world data. The initial analysis of data is followed by an expl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security in Peer-to-Peer Networks: Empiric Model of File Diffusion in BitTorrent

    Publication Year: 2009, Page(s):39 - 44
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (570 KB) | HTML iconHTML

    In this work we analyze propagation of files in the BitTorrent network. The paper covers security problems in peer-to-peer networks and establishes a Malware propagation model. We give overview of existing models and their weaknesses and introduce a propagation or epidemiological model based on model based on real data and real user behavior in the peer-to-peer network BitTorrent. We describe our ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing Privacy Implementations of Database Enquiries

    Publication Year: 2009, Page(s):45 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    Privacy is an issue of increasing concern to the Internet user. To ensure the continued success of distributed information systems, a reliable information flow must be established in certified but immediately evident ways. We begin with basic consideration of the privacy problem in the general setting of database enquiries. From there, we develop a simple solution, which we illustrate with a simpl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Empirical Evaluation on Semantic Search Performance of Keyword-Based and Semantic Search Engines: Google, Yahoo, Msn and Hakia

    Publication Year: 2009, Page(s):51 - 55
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    This paper investigates the semantic search performance of search engines. Initially, three keyword-based search engines (Google, Yahoo and Msn) and a semantic search engine (Hakia) were selected. Then, ten queries, from various topics, and four phrases, having different syntax but similar meanings, were determined. After each query was run on each search engine; and each phrase containing a query... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extraction of Parameters from Well Managed Networked System in Access Control

    Publication Year: 2009, Page(s):56 - 61
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    Designing a networked system (NS), which consists of various network equipments and uses LAN technology, has become increasingly important. However, there have been few studies on NS design. Our previous study suggests that a well managed NS from an access control viewpoint has a fixed degree distribution, regardless of connection restriction. In this paper, we find an approximation function of it... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Domain Based Content Sharing in Digital Home

    Publication Year: 2009, Page(s):62 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2023 KB) | HTML iconHTML

    DRM (Digital Rights Management) and CAS (Conditional Access System) techniques have been used to cut off the illegal use of contents. These techniques, however, brought about much inconvenience as restricting the move or play of the contents of even legal users. In this paper, we propose a new technique for sharing DRM contents based on domain according to the increment of the demand about the pli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Where Only Fools Dare to Tread: An Empirical Study on the Prevalence of Zero-Day Malware

    Publication Year: 2009, Page(s):66 - 71
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (369 KB) | HTML iconHTML

    Zero-day malware is malware that is based on zero-day exploits and/or malware that is otherwise so new that it is not detected by any anti-virus or anti-malware scanners. This paper presents an empirical study that exposed updated Micsosoft Windows XP PCs with updated anti-virus software to a number of unsavoury Internet software repositories. A total of 124 zero-day malware instances were detecte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Behavior-Based Proactive Detection of Unknown Malicious Codes

    Publication Year: 2009, Page(s):72 - 77
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    With the rising popularity of the Internet, the resulting increase in the number of available vulnerable machines, and the elevated sophistication of the malicious code itself, the detection and prevention of unknown malicious codes meet great challenges. Traditional anti-virus scanner employs static features to detect malicious executable codes and is hard to detect the unknown malicious codes ef... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT Security in Banking - Processes, Practical Experiences and Lessons Learned

    Publication Year: 2009, Page(s):78 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    This paper is intended to give an overview about the aspects of information security that are of importance in real life and should be taken into consideration during a regular IT project. Not only in the financial sector it is very popular these days to outsource certain parts of IT like application development and IT operation. From the perspective of a threat analysis team the authors experienc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Usability of Visual Evoked Potentials as Behavioral Characteristics for Biometric Authentication

    Publication Year: 2009, Page(s):84 - 89
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    Biometric authentication methods are one of three approaches currently used. They offer a lot of benefits as well as they have few disadvantages. One of these disadvantages is low level of flexibility. Itpsilas not possible to change your biometric characteristic or even to increase number of your characteristics. This could be problem if we consider many systems with different level of security. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cognitive-Based Biometrics System for Static User Authentication

    Publication Year: 2009, Page(s):90 - 97
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (523 KB) | HTML iconHTML

    In today's globally expanding business world, protecting the identity and transactions of online consumers is crucial for any company to reach out for new markets. This directs digital information technologies towards the adoption of stronger and more secure authentication schemes. Although biometric-based user authentication systems have proven superiority over the traditional ones, there are sev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Assurance Metrics and Aggregation Techniques for IT Systems

    Publication Year: 2009, Page(s):98 - 102
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    Research literature has argued the need for a methodology to measure security assurance levels of a system as vital in order to maintain and improve the overall system security. Building on our close examination of the existing approaches for IT Information assurance, this paper proposes a risk-based security assurance metrics and aggregation techniques to be incorporated in a methodology for the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.