skip to main content
10.1145/2388576acmconferencesBook PagePublication PagessinConference Proceedingsconference-collections
SIN '12: Proceedings of the Fifth International Conference on Security of Information and Networks
ACM2012 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SIN '12: 5th International Conference of Security of Information and Networks Jaipur India October 25 - 27, 2012
ISBN:
978-1-4503-1668-2
Published:
25 October 2012
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

We feel privileged to welcome you all to The Fifth International Conference on Security of Information and Networks (SIN 2012) hosted by Department of Computer Engineering, Malaviya National Institute of Technology at Jaipur from October 25-27, 2012. This has been fifth in a series of successfully held conferences in past. The first two conferences were held in 2007 and 2009 at Gazimagusa, North Cyprus, SIN 2010 was held in Taganrog, Rostov-on-Don, Russia and SIN 2011 was held at the CBD Campus of Macquarie University, Sydney, Australia. Objective of the conference has been to provide a platform for presentation and subsequent discussion on new research articles, applications, ideas and developments in the field of security in information and networks. And considering the response in paper submissions from internationally acclaimed research groups, this objective has been amply met. In all, 88 regular papers and 11 fast abstracts were submitted to SIN 2012. Each paper was reviewed by at least three reviewers. Rigorous review process ensured that quality of research articles was maintained. A total of 35 papers - 20 full (maximum length of 8 pages) and 15 short (maximum length of 5 pages) were accepted. The acceptance ratio for regular papers was ~23%.

research-article
Enhancing the ArchiMate® standard with a responsibility modeling language for access rights management

In this paper, we describe an innovative approach for aligning the business layer and the application layer of ArchiMate to ensure that applications manage access rights consistently with enterprise goals and risk tolerances. The alignment is realized ...

research-article
Split personality malware detection and defeating in popular virtual machines

Virtual Machines have gained immense popularity amongst the Security Researchers and Malware Analysts due to their pertinent design to analyze malware without risking permanent infection to the actual system carrying out the tests. This is because ...

research-article
A concept of unification of network security policies

Security policy is a main mechanism of information security management. While there are a lot of security-related standards and guidelines which specify requirements for high-level security policies, implementation of network security policy still ...

research-article
Botnets: a heuristic-based detection framework

Many different approaches have been used to target Internet security throughout time. It is now easy to realize the attackers' motivational shifts from the early days of lonely, proud-based, virus development to the recent eras of cooperative Internet ...

research-article
Analysis of a secure cooperative channel sensing protocol for cognitive radio networks

Cognitive radio (CR) has been introduced to allow unlicensed users, or better known as secondary users (SUs), to exploit underutilised licensed spectrum owned by the primary users (PUs). The SUs perform channel sensing to check the state of the PUs in ...

research-article
Enforcement of access control policy for mobile ad hoc networks

Mobile ad hoc networks (MANETs) lacks enforcement of policy-based access control mechanism to restrict unauthorized accesses on the network resources. Policy-based security infrastructure in MANET is more complex than traditional network due to ...

research-article
Detection of incorrect position information using speed and time span verification in VANET

Security issues in Vehicular Ad-Hoc Networks (VANETs) are important because of its diverse implications in safety related and congestion avoidance applications. A critical security problem in VANET is injection of false data, i.e. an attacker propagates ...

research-article
Randomness analysis on LED block ciphers

In this paper, we present the statistical test of randomness on the Light Encryption Device (LED) Block Cipher. LED is a lightweight block cipher with a 64-bit block size and variable key lengths from 64 to 128 bits (in multiple of 16 bits). The ...

research-article
A novel framework for intrusion detection in cloud

One of the major security challenges in cloud computing is the detection and prevention of denial-of-service (DoS) attacks. In order to detect and prevent DoS attacks as well as other malicious activities at the network layer, we propose a framework ...

research-article
The method of optimizing the automatic vulnerability validation

Up-to-date security scanners perform vulnerability detection and identification on the basis of indirect features. Exploitation instruments (for example, Metasploit Framework), which are used for further vulnerability validation, launch exploits ...

research-article
Ensemble-based DDoS detection and mitigation model

This work-in-progress paper presents an ensemble-based model for detecting and mitigating Distributed Denial-of-Service (DDoS) attacks, and its partial implementation. The model utilises network traffic analysis and MIB (Management Information Base) ...

research-article
Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar's method

The present medical era has seen quite a considerable amount of work been done in tele-monitoring that involves transmission of biomedical signals through wireless media. Exchange of information amongst various hospital systems and medical centers ...

research-article
An efficient fuzzy controller based technique for network traffic classification to improve QoS

The network traffic management is a key issue as many new emerging applications are flooding the network with their packets. Several time sensitive and low bandwidth applications run along with other time insensitive and bandwidth intensive ...

research-article
Efficient regular expression pattern matching for network intrusion detection systems using modified word-based automata

Network Intrusion Detection Systems (NIDS) intercept the traffic at an organization's network periphery to thwart intrusion attempts. Signature-based NIDS compares the intercepted packets against its database of known vulnerabilities and malware ...

research-article
Classification of polymorphic and metamorphic malware samples based on their behavior

This work proposes a new method of malware classification based on behavior features. We developed a proximity measure for programs, which takes into account WinAPI calls, their arguments, and files handled by these programs. Cluster analysis is used ...

research-article
A region specific robust watermarking scheme based on singular value decomposition

Security breaches are increasing day by day as the technology is innovating and opening new doors. There are various counter measures to keep a check on them and one such method is the watermarking. Region based watermarking is the approach where an ...

research-article
Building of alphabetic data protection cryptosystems on the base of equal power knapsacks with Diophantine problems

The theorems about equal power knapsacks, components of which are the parametrical solution of Tarry-Ascot multistage Diophantine equation system or the numerical solution of such a system were formulated. Mathematical models of alphabet cryptosystems, ...

research-article
Mining control flow graph as API call-grams to detect portable executable malware

Present day malware shows stealthy and dynamic capability and avails administrative rights to control the victim computers. Malware writers depend on evasion techniques like code obfuscation, packing, compression, encryption or polymorphism to avoid ...

research-article
Research about strength of GOST 28147-89 encryption algorithm

The present study considers the improvement of existing cryptanalytical methods in relation to Russian standard of GOST 28147-89 symmetric encryption. This paper researches encryption transformations in GOST 28147-89 algorithm constructed on the ...

research-article
Anomaly based intrusion detection using meta ensemble classifier

Anomaly Based Network Intrusion Detection Systems (ANIDS) mechanisms are largely based on machine learning algorithms and have been found effective in detecting known as well as novel attacks. However, often these algorithms in isolation cannot ...

research-article
SIRIS: secure IRIS authentication system

As the password based authentication systems are not able to meet the performance because they can be stolen, forgotten, cracked, sniffed and tampered with. Lateral thinking to this problem evolved the use of biometrics to authenticate the person ...

research-article
Efficient image encryption and decryption using discrete wavelet transform and fractional Fourier transform

We propose an algorithm that shows improvement in computation timeof existing image encryption-decryption methods. The algorithm also introduces additional one-level of encryption key into the existing methods. Image compression properties of the DWT (...

research-article
Methods of automated analysis of vendor specific implementation of stateful-filtration

In this paper we will consider the special research methodology of stateful filtering in firewalls. Analysis of TCP/IP protocols, which connected with stateful filtering, was carried out and particular tests for different types of implementation were ...

research-article
Detection of NDP based attacks using MLD

Neighbor Discovery Protocol (NDP) is one of the core protocol in IPv6 network. It provides facilities like Stateless Address Autoconfiguration (SLAAC), Neighbor unreachability Detection (NUD), address resolution (similar to ARP in IPv4) etc. Due to lack ...

research-article
Hybridization of DCTune and psycho-visual saliency model to improve security and capacity in DCT based image watermarking

Watermarking in images is necessary for authentication of digital library based applications, mostly. For efficient utilization of storage space and bandwidth of communication channel, compressed images ensuring fair amount of quality is employed. In ...

research-article
Lip peripheral motion for visual surveillance

Real-time surveillance systems, dealing with lipreading, can benefit from a reduction in visual data to be processed. This reduces processing time and improves the efficiency of the system. These systems take features extracted from the mouth region for ...

research-article
Fusion of multiple data mining techniques for effective network intrusion detection: a contemporary approach

Today, with more and more computers getting connected to public accessible networks like Internet, computer systems are more and more susceptible to attacks. There is a need of effective intrusion detection systems (IDS) to protect computers from these ...

research-article
(Student contribution) ASPS: an authentication scheme using pre-formed visual cryptographic shares

In 1995, Naor and Shamir proposed a technique of secret sharing, called visual cryptography. In visual cryptography, the secret message is divided into shares which are copied onto transparencies and given to participants. In general k-out-of-n visual ...

research-article
Detection attack analysis using partial watermark in DCT domain

The paper presents a novel framework for blind watermark detection on additive watermarking in Discrete Cosine Transform (DCT) domain. Watermarks which resist any attempt by an adversary to thwart their intended purpose such as unauthorized detection, ...

research-article
A clustering based algorithm for network intrusion detection

The secure information transmission is very important in the present scenario. Many intrusion detection system (IDS) have been developed in recent past which are based on either signature information or anomaly information. But all these systems do ...

Contributors
  • Malaviya National Institute of Technology Jaipur
  • Hasan Kalyoncu University
  • Southern Federal University
  • Macquarie University
  • Indian Institute of Technology Bombay

Recommendations

Acceptance Rates

Overall Acceptance Rate102of289submissions,35%
YearSubmittedAcceptedRate
SIN '18422457%
SIN '16461226%
SIN '15923437%
SIN '141093229%
Overall28910235%