2010 Fifth International Conference on Internet Monitoring and Protection

9-15 May 2010

Filter Results

Displaying Results 1 - 25 of 33
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for reuse | PDF file iconPDF (2363 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for reuse | PDF file iconPDF (11 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - vii
    Request permission for reuse | PDF file iconPDF (170 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2010, Page(s):viii - ix
    Request permission for reuse | PDF file iconPDF (69 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2010, Page(s):x - xii
    Request permission for reuse | PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010, Page(s):xiii - xiv
    Request permission for reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • IDSAI: A Distributed System for Intrusion Detection Based on Intelligent Agents

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1288 KB) | HTML iconHTML

    This paper describes an intelligent system for automatic detection of intrusions in computer networks. Its architecture is based on a multi-agent system in which several types of agents cooperate together to perform a fast and reliable detection of intrusions. Some agents are in charge of monitoring the traffic of the communication network using as core the well-known SNORT system fitted with diff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparing Anomaly Detection Methods in Computer Networks

    Publication Year: 2010, Page(s):7 - 10
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (142 KB) | HTML iconHTML

    This work in progress outlines a comparison of anomaly detection methods that we are undertaking. We are comparing different types of anomaly detection methods with the purpose of achieving results covering a broad spectrum of anomalies. We also outline the datasets that we will be using and the metrics that we will use for our evaluation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IDS Adaptation for an Efficient Detection in High-Speed Networks

    Publication Year: 2010, Page(s):11 - 15
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    Intrusion Detection Systems are essential in a network security solution. However, with the significant development of network technologies, the current IDS architecture does not support high-speed communications. Therefore, improving the performance of IDS is a major concern for researchers. In this paper, we present a model of intrusion detection based on the classification of network connection... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BotDigger: A Fuzzy Inference System for Botnet Detection

    Publication Year: 2010, Page(s):16 - 21
    Cited by:  Papers (7)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (426 KB) | HTML iconHTML

    This paper proposes BotDigger, a fuzzy logic-based botnet detection system. In this system, we derive a set of logical rules based on a well known botnet characteristics. Utilizing these rules, an adaptive logic algorithm will be applied on network traffic traces searching for botnet footprints and associating a trust level for each host present in the sampled data. Future work will focus on evalu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Risk Management for Web and Distributed Software Development Projects

    Publication Year: 2010, Page(s):22 - 28
    Cited by:  Papers (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (364 KB) | HTML iconHTML

    The level of complexity and risks associated with software have been increasing in line with the growth of the software industry. Modern software development, with an emphasis on web and distributed development, presents specific challenges and risk areas to the software industry which need to be considered and managed. In this paper we survey a number of software risk management approaches and id... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Risk-Aware Usage Decision Making in Highly Dynamic Systems

    Publication Year: 2010, Page(s):29 - 34
    Cited by:  Papers (10)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (179 KB) | HTML iconHTML

    Usage control model (UCON) is based on the idea that attributes required for decision-making can be changed over a period of usage. Since it is not always possible to get a fresh and trustworthy value of attributes, a decision has to be done with some uncertainties in mind. Moreover, modern systems become more distributed and dynamic and this evolution aggravates the problem. Such trend demands fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coalitional Game Theory for Security Risk Management

    Publication Year: 2010, Page(s):35 - 40
    Cited by:  Papers (7)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    Quantitative models for security risk management in organizations are recently receiving an increased attention in the research community. This paper investigates the possibility of cooperation among autonomous divisions of an organization with dependent security assets and/or vulnerabilities for reducing overall security risks. A coalitional game is formulated for modeling cooperation possibiliti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Economic Risk Assessment Using the Fractal Market Hypothesis

    Publication Year: 2010, Page(s):41 - 47
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1142 KB) | HTML iconHTML

    This paper considers the Fractal Market Hypothesis (FMH) for assessing the risk(s) in developing a financial portfolio based on data that is available through the Internet from an increasing number of sources. Most financial risk management systems are still based on the Efficient Market Hypothesis which often fails due to the inaccuracies of the statistical models that underpin the hypothesis, in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FEMRA: Fuzzy Expert Model for Risk Assessment

    Publication Year: 2010, Page(s):48 - 53
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (411 KB) | HTML iconHTML

    Risk assessment is a major part of the ISMS Process. The Information Security Management System standards specify guidelines and a general framework for risk assessment. In many existing standards, such as NIST and ISO27001, risk assessment is described however, while these standards present some guidelines, there are no details on how to implement it in an organization. In a complex organization,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A-MAKE: An Efficient, Anonymous and Accountable Authentication Framework for WMNs

    Publication Year: 2010, Page(s):54 - 59
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    In this paper, we propose a framework, named as A-MAKE, which efficiently provides security, privacy, and accountability for communications in wireless mesh networks. More specifically, the framework provides an anonymous mutual authentication protocol whereby legitimate users can connect to network from anywhere without being identified or tracked. No single party (e.g., network operator) can vio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is Apple's iMac Leopard Operating System Secure under ARP-Based Flooding Attacks?

    Publication Year: 2010, Page(s):60 - 64
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (838 KB) | HTML iconHTML

    Apple's iMac computers are promoted by the Apple Inc. to be secure, safe, virus free and fast computers. In this experimental paper, we evaluate the security offered by the iMac computers with its usual Leopard Operating System, against ARP-based flooding attacks in a Gigabit LAN environment. We compared the effect of ARP attacks on Leopard OS against those on the Windows XP-SP2 when installed on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Provable Security for the Fuzzy Fingerprint Vault

    Publication Year: 2010, Page(s):65 - 73
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    We investigate the security of privacy enhancing techniques for biometric applications. The fuzzy vault of Jules and Sudan is a technique that allows error tolerant authentication, while preserving the privacy of the reference data. Several publications have proposed its application to fingerprints in order to implement privacy-enhanced biometric authentication. While the heuristic security estima... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authentication of Biometric Features Using Texture Coding for ID Cards

    Publication Year: 2010, Page(s):74 - 83
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (6084 KB) | HTML iconHTML

    The use of image based information exchange has grown rapidly over the years in terms of both electronic-to-electronic image storage and transmission and in terms of maintaining paper documents in electronic form. Further, with the dramatic improvements in the quality of COTS (Commercial-Off-The-Shelf) printing and scanning devices, the ability to counterfeit electronic and printed documents has b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sound-Based Multimodal Person Identification from Signature and Voice

    Publication Year: 2010, Page(s):84 - 88
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (238 KB) | HTML iconHTML

    Person identification as a security means has a variety of important applications. Many techniques and automated systems have been developed over the past few decades; each has its own advantages and limitations. There are often trade-offs amongst reliability, the ease of use, ethical/human rights issues, and acceptability in a particular application. Multimodal identification and authentication c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Method for Supporting Fairness in Digital License Reselling

    Publication Year: 2010, Page(s):89 - 98
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Current Digital Rights Management (DRM) systems permit a consumer to buy a digital license to access the corresponding content on his device. Under these current systems, however, the consumer is unable to resell the license.To allow the consumer to resell the license, all entities involved in the reselling process must be treated fairly. Fairness means that a reseller should obtain payment if and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Observations of UDP to TCP Ratio and Port Numbers

    Publication Year: 2010, Page(s):99 - 104
    Cited by:  Papers (27)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (699 KB) | HTML iconHTML

    Widely used protocols (UDP and TCP) are observed for variations of the UDP to TCP ratio and of port number distribution, both over time and between different networks. The purpose of the study was to understand the impact of application trends, especially the growth in media streaming, on traffic characteristics. The results showed substantial variability but little sign of a systematic trend over... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constructing Communication Profiles by Clustering Selected Network Traffic Attributes

    Publication Year: 2010, Page(s):105 - 109
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (511 KB) | HTML iconHTML

    Large-scale IP networks cause special challenges to the security. The network consists of a large number of devices with a vast variety of traffic behavior. Implementation of the intrusion detection and monitoring mechanisms are often ineffective or require a lot of hardware and human resources. In this paper we present a methodology to construct communication profiles by making a time series and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.