2016 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)

13-15 Oct. 2016

Filter Results

Displaying Results 1 - 25 of 102
  • [Front cover]

    Publication Year: 2016, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (7996 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2016, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2016, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (147 KB)
    Freely Available from IEEE
  • Welcome to CyberC 2016

    Publication Year: 2016, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (264 KB)
    Freely Available from IEEE
  • Message from the Technical Program Chairs

    Publication Year: 2016, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (146 KB)
    Freely Available from IEEE
  • Message from the Steering Committee Chair

    Publication Year: 2016, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2016, Page(s):xviii - xxi
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2016, Page(s):xxii - xxv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB)

    These keynotes discuss the following: Big Data, Internet of Things, cybersecurity, stream analytics & knowledge discovery; SDN/NFV & open networking ecosystem; Data mining: tools and practices; Network coding -applications and basics. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Compile-Time Obfuscation Scheme for Software Protection

    Publication Year: 2016, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    With the development of reverse engineering, the software industry has suffered a great loss from the software piracy and malicious attack for a long time. What is ridiculous is that code obfuscation techniques that originate from malware can hide specific function of a program from malicious analysis and is frequently employed to mitigate this risk. However, while most of today's obfuscation meth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud Data Security and Integrity Protection Model Based on Distributed Virtual Machine Agents

    Publication Year: 2016, Page(s):6 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (697 KB) | HTML iconHTML

    Cloud computing has been popular as the new IT infrastructure, because it is able to provide convenient and low-cost network computing and storage service. However, duo to separation of ownership and control rights, cloud users' data bring about many security issues, including data leakage and data tampering. Now, the security and integrity of cloud data usually depend on a trusted third party aud... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inferring Phylogenetic Networks of Malware Families from API Sequences

    Publication Year: 2016, Page(s):14 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB) | HTML iconHTML

    Phylogeny model inference plays an important role in malware forensics. It aims at revealing the evolutionary relationship among malware instances. It is expected to be helpful for uncovering the trends of malware evolution and establishing a principled naming scheme. Although tree-based models are the mainstream direction, they are not suited to represent the reticulation events which are occasio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy Protection of Data Attributes in Cloud Environment

    Publication Year: 2016, Page(s):18 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (889 KB) | HTML iconHTML

    At present, there are a lot of mature encryption mechanisms and access control models for the protection of the data content in cloud environment. However, the research on the privacy protection of data attributes in cloud is still in the initial stage, which can be classified as two types: one is the privacy protection of data attributes during data transmission, including routing information, ge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reviving Android Malware with DroidRide: And How Not To

    Publication Year: 2016, Page(s):27 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    Malware has started grabbing its undeserved share long before the blossom of Android ecosystem. Injected with malware, malicious applications (apps) may threat users in various ways like financial charges and information stealing. When the severity of a deluge of malware was first noticed, malware detectors delivered unsatisfactory detection accuracy, which further degenerated upon simple transfor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Botnet Detection Method Based on Preprocessing Data Packet by Graph Structure Clustering

    Publication Year: 2016, Page(s):42 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    Botnets are one of the most serious threats in the Internet, and thus the effective detection of the botnet becomes more and more important. In this paper, inspired by IP tracing technology, we propose a novel botnet detection method that can analyze the data packets, based on graph structure clustering. This method analyzes the comprehensive information of packages content and timestamp flow. Suc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cyber Threat Detection and Application Analysis

    Publication Year: 2016, Page(s):46 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (498 KB) | HTML iconHTML

    With the security situation in Cyberspace constantly becoming worse, Cyber threat detection has attracted a lot of researching attentions. In this paper, existing detection technologies are firstly reviewed. Secondly, a framework of capturing the abnormal traffic of botnets is proposed. Major modules and key detection techniques are presented at the same time. The hidden threat detection in physic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic Reseeding DRBG Based on SRAM PUFs

    Publication Year: 2016, Page(s):50 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (363 KB) | HTML iconHTML

    Deterministic random bit generator (DRBG) is an important building block for many cyber security systems. The secrecy of the seeds provides the basis for the security of DRBG. Periodic or dynamic reseeding is a good way of addressing the threat of the DRBG seeds, entropy input and working state being compromised over time. In this paper, the SRAM PUFs noisy cells will be used as the entropy source... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Lattice-Based Access Control Model for Social Networks

    Publication Year: 2016, Page(s):54 - 61
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB) | HTML iconHTML

    Nowadays, social networks have been used widely. They help people communicate with family, friends or colleagues easily. However, they are lack of effective protection and monitoring about message transmission. In addition, the rapid updates of messages and user information also give difficulties to administrators. The existing security protection mechanisms in social networks could not protect us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Design of Pipeline MDC-FFT Processor Based on Various Memory Access Mechanism

    Publication Year: 2016, Page(s):62 - 65
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    In this paper, a novel design of Multi-Path Delay Commutator Architecture FFT processor(MDC-FFT) is proposed based on customized rotation factor ROM(RF-ROM) with various memory access mechanism for OFDM systems. For the OFDM systems, the combined FFT algorithm of Radix-2 FFT and Radix-22FFT is conducted. The pipeline architecture is also proposed for its high throughput and scalability. With hybri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Access Control Model Based on Role and Attribute and Its Implementation

    Publication Year: 2016, Page(s):66 - 71
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (861 KB) | HTML iconHTML

    Combining the role-based access control (RBAC) model with the attribute-based access control (ABAC) model is a popular direction of current research on access control models. At present, many RABAC (RBAC + ABAC) models have been proposed. On the basis of RBAC model, these models dynamically apply ABAC rules to user-role mapping, role-permission mapping and user-permission mapping, thus realizing t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A LEAP PLUS Key Management Scheme with Sliding Time Interval

    Publication Year: 2016, Page(s):72 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    In this paper, a new and more secure key management scheme named LEAP PLUS is presented based on the concept of sliding time interval. Through numerical calculation, the dependency on primary key is reduced in LEAP PLUS scheme compared with LEAP. In addition, with the introduction of sliding time interval, less cost of storage in LEAP PLUS scheme is required than LEAP expansion scheme. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic Access Control Policy Based on Hierarchical Description

    Publication Year: 2016, Page(s):76 - 80
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    Access control policy is utilized to ensure that the available resources aren't accessed unintentionally. Traditional access control policy approaches generally describe the core elements as a holistic, which has high coupling, thus it leads to a limited flexibility and lower dynamic of the policy. To solve this issue, we proposed a dynamic access control policy which is based on hierarchical desc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Boundary and Protection

    Publication Year: 2016, Page(s):81 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    The exposure of PRISM reminds us of network sovereignty. There are two problems about network sovereignty-network boundary partition and protection. These two problems are discussed in this paper. A method of multidimensional network boundary partition is proposed based on comprehensive analysis of existing schemes. And network boundary protection is studied based on standard rules of cyber warfar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Particle Filter-Based Approach for Effectively Detecting Low-Rate Denial of Service Attacks

    Publication Year: 2016, Page(s):86 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (709 KB) | HTML iconHTML

    Low-rate Denial of Service (LDoS) attack is one of great threats to computing platform and big data center. LDoS attacks are difficult to be found because its average attack rate is low enough to evade traditional DoS-based countermeasures. In this paper, the propagation back (BP) model of neural network is used to establish the nonlinear model of network traffic, and a method of LDoS attacks dete... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.