We feel privileged to welcome you all to The Fifth International Conference on Security of Information and Networks (SIN 2012) hosted by Department of Computer Engineering, Malaviya National Institute of Technology at Jaipur from October 25-27, 2012. This has been fifth in a series of successfully held conferences in past. The first two conferences were held in 2007 and 2009 at Gazimagusa, North Cyprus, SIN 2010 was held in Taganrog, Rostov-on-Don, Russia and SIN 2011 was held at the CBD Campus of Macquarie University, Sydney, Australia. Objective of the conference has been to provide a platform for presentation and subsequent discussion on new research articles, applications, ideas and developments in the field of security in information and networks. And considering the response in paper submissions from internationally acclaimed research groups, this objective has been amply met. In all, 88 regular papers and 11 fast abstracts were submitted to SIN 2012. Each paper was reviewed by at least three reviewers. Rigorous review process ensured that quality of research articles was maintained. A total of 35 papers - 20 full (maximum length of 8 pages) and 15 short (maximum length of 5 pages) were accepted. The acceptance ratio for regular papers was ~23%.
Enhancing the ArchiMate® standard with a responsibility modeling language for access rights management
In this paper, we describe an innovative approach for aligning the business layer and the application layer of ArchiMate to ensure that applications manage access rights consistently with enterprise goals and risk tolerances. The alignment is realized ...
Split personality malware detection and defeating in popular virtual machines
Virtual Machines have gained immense popularity amongst the Security Researchers and Malware Analysts due to their pertinent design to analyze malware without risking permanent infection to the actual system carrying out the tests. This is because ...
A concept of unification of network security policies
Security policy is a main mechanism of information security management. While there are a lot of security-related standards and guidelines which specify requirements for high-level security policies, implementation of network security policy still ...
Botnets: a heuristic-based detection framework
Many different approaches have been used to target Internet security throughout time. It is now easy to realize the attackers' motivational shifts from the early days of lonely, proud-based, virus development to the recent eras of cooperative Internet ...
Analysis of a secure cooperative channel sensing protocol for cognitive radio networks
Cognitive radio (CR) has been introduced to allow unlicensed users, or better known as secondary users (SUs), to exploit underutilised licensed spectrum owned by the primary users (PUs). The SUs perform channel sensing to check the state of the PUs in ...
Enforcement of access control policy for mobile ad hoc networks
Mobile ad hoc networks (MANETs) lacks enforcement of policy-based access control mechanism to restrict unauthorized accesses on the network resources. Policy-based security infrastructure in MANET is more complex than traditional network due to ...
Detection of incorrect position information using speed and time span verification in VANET
Security issues in Vehicular Ad-Hoc Networks (VANETs) are important because of its diverse implications in safety related and congestion avoidance applications. A critical security problem in VANET is injection of false data, i.e. an attacker propagates ...
Randomness analysis on LED block ciphers
In this paper, we present the statistical test of randomness on the Light Encryption Device (LED) Block Cipher. LED is a lightweight block cipher with a 64-bit block size and variable key lengths from 64 to 128 bits (in multiple of 16 bits). The ...
A novel framework for intrusion detection in cloud
One of the major security challenges in cloud computing is the detection and prevention of denial-of-service (DoS) attacks. In order to detect and prevent DoS attacks as well as other malicious activities at the network layer, we propose a framework ...
The method of optimizing the automatic vulnerability validation
Up-to-date security scanners perform vulnerability detection and identification on the basis of indirect features. Exploitation instruments (for example, Metasploit Framework), which are used for further vulnerability validation, launch exploits ...
Ensemble-based DDoS detection and mitigation model
This work-in-progress paper presents an ensemble-based model for detecting and mitigating Distributed Denial-of-Service (DDoS) attacks, and its partial implementation. The model utilises network traffic analysis and MIB (Management Information Base) ...
Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar's method
The present medical era has seen quite a considerable amount of work been done in tele-monitoring that involves transmission of biomedical signals through wireless media. Exchange of information amongst various hospital systems and medical centers ...
An efficient fuzzy controller based technique for network traffic classification to improve QoS
The network traffic management is a key issue as many new emerging applications are flooding the network with their packets. Several time sensitive and low bandwidth applications run along with other time insensitive and bandwidth intensive ...
Efficient regular expression pattern matching for network intrusion detection systems using modified word-based automata
Network Intrusion Detection Systems (NIDS) intercept the traffic at an organization's network periphery to thwart intrusion attempts. Signature-based NIDS compares the intercepted packets against its database of known vulnerabilities and malware ...
Classification of polymorphic and metamorphic malware samples based on their behavior
This work proposes a new method of malware classification based on behavior features. We developed a proximity measure for programs, which takes into account WinAPI calls, their arguments, and files handled by these programs. Cluster analysis is used ...
A region specific robust watermarking scheme based on singular value decomposition
Security breaches are increasing day by day as the technology is innovating and opening new doors. There are various counter measures to keep a check on them and one such method is the watermarking. Region based watermarking is the approach where an ...
Building of alphabetic data protection cryptosystems on the base of equal power knapsacks with Diophantine problems
The theorems about equal power knapsacks, components of which are the parametrical solution of Tarry-Ascot multistage Diophantine equation system or the numerical solution of such a system were formulated. Mathematical models of alphabet cryptosystems, ...
Mining control flow graph as API call-grams to detect portable executable malware
Present day malware shows stealthy and dynamic capability and avails administrative rights to control the victim computers. Malware writers depend on evasion techniques like code obfuscation, packing, compression, encryption or polymorphism to avoid ...
Research about strength of GOST 28147-89 encryption algorithm
The present study considers the improvement of existing cryptanalytical methods in relation to Russian standard of GOST 28147-89 symmetric encryption. This paper researches encryption transformations in GOST 28147-89 algorithm constructed on the ...
Anomaly based intrusion detection using meta ensemble classifier
Anomaly Based Network Intrusion Detection Systems (ANIDS) mechanisms are largely based on machine learning algorithms and have been found effective in detecting known as well as novel attacks. However, often these algorithms in isolation cannot ...
SIRIS: secure IRIS authentication system
As the password based authentication systems are not able to meet the performance because they can be stolen, forgotten, cracked, sniffed and tampered with. Lateral thinking to this problem evolved the use of biometrics to authenticate the person ...
Efficient image encryption and decryption using discrete wavelet transform and fractional Fourier transform
We propose an algorithm that shows improvement in computation timeof existing image encryption-decryption methods. The algorithm also introduces additional one-level of encryption key into the existing methods. Image compression properties of the DWT (...
Methods of automated analysis of vendor specific implementation of stateful-filtration
In this paper we will consider the special research methodology of stateful filtering in firewalls. Analysis of TCP/IP protocols, which connected with stateful filtering, was carried out and particular tests for different types of implementation were ...
Detection of NDP based attacks using MLD
Neighbor Discovery Protocol (NDP) is one of the core protocol in IPv6 network. It provides facilities like Stateless Address Autoconfiguration (SLAAC), Neighbor unreachability Detection (NUD), address resolution (similar to ARP in IPv4) etc. Due to lack ...
Hybridization of DCTune and psycho-visual saliency model to improve security and capacity in DCT based image watermarking
Watermarking in images is necessary for authentication of digital library based applications, mostly. For efficient utilization of storage space and bandwidth of communication channel, compressed images ensuring fair amount of quality is employed. In ...
Lip peripheral motion for visual surveillance
Real-time surveillance systems, dealing with lipreading, can benefit from a reduction in visual data to be processed. This reduces processing time and improves the efficiency of the system. These systems take features extracted from the mouth region for ...
Fusion of multiple data mining techniques for effective network intrusion detection: a contemporary approach
Today, with more and more computers getting connected to public accessible networks like Internet, computer systems are more and more susceptible to attacks. There is a need of effective intrusion detection systems (IDS) to protect computers from these ...
(Student contribution) ASPS: an authentication scheme using pre-formed visual cryptographic shares
In 1995, Naor and Shamir proposed a technique of secret sharing, called visual cryptography. In visual cryptography, the secret message is divided into shares which are copied onto transparencies and given to participants. In general k-out-of-n visual ...
Detection attack analysis using partial watermark in DCT domain
The paper presents a novel framework for blind watermark detection on additive watermarking in Discrete Cosine Transform (DCT) domain. Watermarks which resist any attempt by an adversary to thwart their intended purpose such as unauthorized detection, ...
A clustering based algorithm for network intrusion detection
The secure information transmission is very important in the present scenario. Many intrusion detection system (IDS) have been developed in recent past which are based on either signature information or anomaly information. But all these systems do ...



