International Symposium on Digital Forensics and Security - Symposium Program and Abstracts - ISDFS
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
International Symposium on Digital Forensics and Security Symposium Program and Abstracts Edited by Prof. Dr. Asaf VAROL Assoc. Prof. Dr. Murat KARABATAK Assoc. Prof. Dr. Cihan VAROL Sevginur TEKE
7TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY 10-12 JUNE 2019 Barcelos - PORTUGAL Symposium Program and Abstracts Edited by Prof. Dr. Asaf VAROL Assoc. Prof. Dr. Murat KARABATAK Assoc. Prof. Dr. Cihan VAROL Sevginur TEKE Barcelos - PORTUGAL 2019
WELCOME NOTE FROM GENERAL CHAIR On behalf of Organizing Committee and Consortium Members of ISDFS, we welcome you to the 7th International Symposium on Digital Forensics and Security (ISDFS 2019) in Barcelos, Portugal. It is an exciting time for ISDFS as we continue to grow and adapt, remaining always adaptable, motivated and responsive to the technological advances and challenges in the field of Digital Forensics, Cyber Security, Cryptopgraphy, Data Privacy and Computer Science. The world of Cyber Security, as the umbrella terminology, is an exciting area in which to work and study and we’ll continue to meet and bring inspired people together in forums like this, to ensure our ISDFS remains at the cutting edge. ISDFS originially held in May 2013, at Firat University, Turkey. While this year, we are gathering together in Barcelos, Portugal for the 7th event, previously we also had very succesful events at Huntsville-The Woodlands, Texas, USA; Ankara, Turkey; Little Rock, Arkansas, USA; Tirgu Mures, Romania; and Antalya, Turkey. We already arranged the next year’s event and it will be held in Beirut Lebanon on June 1st and 2nd, 2020. ISDFS is organized by a consortium consists of Firat University (TR), Sam Houston State University (USA), Gazi University (TR), University of Arkansas at Little Rock (USA), University of Medicine, Pharmacy, Sciences and Technology of Tirgu Mures (RO), Polytechnic Institute of Cavado and Ave (PT), Lebanon Arab Open University (LB), San Diego State University (USA), Hacettepe University (TR), Balıkesir University (TR), Youngstown State University (US), Başkent University (TR), HAVELSAN (TR), Singidunum University (RS) and Association of Software and Cyber Security of Turkey. The symposium’s technical program is organized into four tracks; Digital Forensics, Information Security, Data Privacy and Cryptography, and Computer Science in general. Three Keynote Speakers are invited to the conference. Dr. Peter Cooper will discuss about “Distributed Ledgers as a Support System for Digital Evidence Management”, Dr. Nuno Ricardo Mateus Coelho will give a talk about “Information Security Challenges – A Paranoid Operative System Perspective” and finally Dr. Şeref Sağıroğlu will talk about “Cyber Security and Big Data Issues in Turkey”. Since 2016, the conference has been sponsored by the IEEE Society and scholarly works disseminated in the symposium have been cited by Xplore Scientific Index. This year, IEEE Portugal Section sponsored the event technically and the papers presented at the conference will be published again in IEEE Explore. ISDFS is growing every year. This year, we received the highest number of paper submissions for the symposium. We could not achieve this growth without the support of consortium members. I also would like to extend my appreciatiton to Prof. Dr. Maria Manuela Cruz-Cunha, Assoc. Prof. Dr. Nuno Lopes, Assoc. Prof. Dr. Sandro Carvalho and Assoc. Prof. Dr. Luis Ferreira as the local orgazining committee to help us to book this venue for the event and other logistics for the conference. I also would like to thank IEEE Portugal Section, and in particular Jose Pedro Silva, IEEE Portugal Chair, for sponsoring the conference from IEEE side. And finally I would like to take this opportunity to thank Scientific Committee Members for their help during the paper review process. Prof. Dr. Asaf Varol General Chair of ISDFS
Organizing Committee Term Chairs of ISDFS-2019 Prof. Dr. Maria Manuela Cruz Cunha, Polytechnic Institute of Cávado and Ave, PT General Chair of ISDFS Prof. Dr. Asaf Varol, Fırat University, TR Co-Chairs and Program Chairs Assoc. Prof. Dr. Murat Karabatak, Firat University, TR Assoc. Prof. Dr. Cihan Varol, Sam Houston State University, USA Assoc. Prof. Nuno Lopes, Polytechnic Institute of Cávado and Ave, PT Assoc. Prof. Sandro Carvalho, Polytechnic Institute of Cávado and Ave, PT Assoc. Prof. Luis Ferreira, Polytechnic Institute of Cávado and Ave, PT Conference Registration and Arrangements Committee Ass. Prof. Dr. Tamer Kavuran, Graphic Design, Firat University, TR Res. Assist. Gamzepelin Aksoy, Web Design and Programming, Firat University, TR Halil Öztürk, Web Design and Programming, Firat University, TR Sevginur Teke, Web Design and Programming, Firat University, TR Publications Committee Members Assoc. Prof. Dr. Murat Karabatak, Firat University, TR Assoc. Prof. Dr. Cihan Varol, Sam Houston State University, USA Consortium members Prof. Dr. Asaf Varol, Firat University, TR Prof. Dr. Peter Alan Cooper, Sam Houston State University, USA Prof. Dr. Şeref Sağıroğlu, Gazi University, TR Prof. Dr. Coşkun Bayrak, Youngstown State University, USA Assoc. Prof. Dr. Haller Piroska, University of Medicine, Pharmacy, Sciences and Technology, RO Prof. Dr. Maria Manuela Cruz-Cunha, Polytechnic Institute of Cávado and Ave, PT Assoc. Prof. Dr. Hassan Sbeity, Arab Open University, LB Prof. Dr. Yusuf Öztürk, San Diego State University, USA Prof. Dr. Çetin Arslan, Hacettepe University, TR Assoc. Prof. Dr. Ayhan İstanbullu, Balıkesir University, TR Prof. Dr. Vahit Bıçak, Başkent University, TR Assoc. Prof. Dr. İzzet Gökhan Özbilgin, Havelsan Technology and Academy Director, TR Prof. Dr. Milan Tuba, Singidunum University, RS Association of Software and Cyber Security of Turkey, TR II
Scientific Committee Members First Name Middle Last Name Organization Abdulsamet Hasiloglu Ataturk University, TR Abdullah Cavusoglu HAVELSAN, TR Ahmet Hamdi Atalay HAVELSAN, TR Ahmad Fadlallah USAL Ahmet Hasan Koltuksuz Yasar University, TR Ali Aydin Selçuk TOBB ETU, TR Ali Yazici Atilim University, TR Antal Margit Sapientia University, RO Asaf Varol Firat University, TR Atila Bostan Atilim University, TR Ayhan Erdem Gazi University, TR Ayhan Istanbullu Balikesir University, TR Aytug Boyaci Firat University, TR Baris Aksanli San Diego University, US Bassem Haidar Public Lebanese University, LB Bedri Ozer Firat University, TR Bela Genge Univ. of Medicine, Pharmacy, Sciences and Techn., RO Bilal Alatas Firat University, TR Bogdan Robu Grenoble Institute of Technology, FR Bünyamin Ciylan Gazi University, TR Chia-Chu Chiang University of Arkansas at Little Rock, US Chris Bowerman University of Sunderland, UK Cihan Varol Sam Houston State University, US Coskun Bayrak Youngstown State University, US Derya Avcı Firat University,TR Dimitris Geneiatakis Aristotle University of Thessaloniki, GR Ecir Ugur Kucuksille Suleyman Demirel University, TR Engin Avci Firat University, TR Enis Karaarslan Marmara University, TR Erhan Akbal Firat University, TR Erhan Akin Firat University, TR Erkan Tanyildizi Firat University, TR Erkay Savas Sabanci University, TR Esref Adali ITU,TR Fahad Salamh Purdue University, USA Fakis Alexandros University of the Aegean, GR Fatih Ozkaynak Firat University, TR Ferruh Ozbudak METU, TR Georgios Kambourakis University of the Aegean, GR Georgios Karopoulos University of Athens, GR Gheorghe Sebestyen Technical University of Cluj-Napoca, RO Hamadou Saliah Hassane Teluq University, CA Hassan Noura Arab Open University, LB Hassan Sbeyti Arab Open University, LB Hayri Sever Hacettepe University, TR Husrev Taha Sencar TOBB ETU, TR Ibrahim Halil Bulbul Ahmet Yesevi University, KZ Ibrahim Ozcelik Sakarya University, TR Ibrahim Sogukpinar Gebze Institute of Technology,TR Ihsan Basturk Supreme Court, TR Ioan Salomie Technical University of Cluj-Napoca, RO Ibrahim Turkoglu Firat University, TR Ilker Ozcelik Recep Tayyip Erdogan University, TR III
Joao Vilaça Polytechnic Institute of Cávado and Ave, PT Jozsef Vssarhelyi University of Miskolc, HU Kenji Yoshigoe University of Arkansas at Little Rock, US Lei Chen Georgia Southern University, US Leyla Keser Istanbul Bilgi University, TR Luis Ferreira Polytechnic Institute of Cávado and Ave, PT Majed Sinane Public Lebanese University, LB Maria Manuela Cruz Cunha Polytechnic Institute of Cávado and Ave, PT Mehmet Demirci Gazi University, TR Mehmet Kaya Syracuse University, US Mohand Tahar Kechadi University College Dublin, IE Mohamad Malli Arap Open University, LB Mohamad Sbeiti Deutsche Telecom, LB Muhammet Baykara Firat University, TR Muharrem Tolga Sakalli Trakya University, TR Muharrem Tuncay Gencoglu Firat University, TR Murat Karabatak Firat University, TR Murat Kayri Batman University, TR Mustafa Alkan BTK, TR Mustafa Kaya Firat University, TR Mustafa Ulaş Firat University, TR Narasimha K. Shashidhar Sam Houston State University, US Nazife Baykal METU-Cyprus, CY Nhien-An Le-Khac University College Dublin, IE Nuno Mateus Coelho Univ. of Trás os Montes e Alto Douro, PT Nuno Rodrigues Polytechnic Institute of Cávado and Ave, PT Ozgur Karaduman Firat University, TR Peter Alan Cooper Sam Houston State University, US Raymond Choo University of South Australia, AU Razvan Deaconescu Univ. Politehnica of Bucharest, RO Resul Das Firat University, TR Sandro Carvalho Polytechnic Institute of Cávado and Ave, PT Seda Arslan Tuncer Firat University, TR Sedat Akleylek Ondokuz Mayis University, TR Seethal Paluri San Diego State University, US Selcuk Kavut Balikesir University, TR Sengul Dogan Firat University, TR Seref Sagiroglu Gazi University, TR Sundar Krishnan Sam Houston State University, US Sunil Kumar San Diego State University, US Suzanne McIntosh New York University, US Sylvain Guilley Secure-IC S.A.S Rennes, FR Szabo Laszlo Sapientia University, RO Szanto Zoltan Sapientia University, RO Tolga Sakalli Trakya University, TR Tuncay Dincer Ege University, TR Tuncay Gencoglu Firat University, TR Turker Tuncer Firat University, TR Turksel Kaya Benshgir TODAIE, TR Uraz Yavanoğlu Gazi University, TR Vahit Bicak Başkent University, TR Vajda Tamas Sapientia University, RO Yilmaz Vural Hacettepe University, TR Yusuf Ozturk San Diego State University, US Yusuf Tulgar Net Data Soft, TR Zisis Tsiatsikas University of the Aegean, GR IV
KEYNOTE SPEAKERS Prof. Dr. Peter A. Cooper Sam Houston State University – USA 10.06.2019 / MONDAY / 14.30 – 15.30 / AUDITORIO “Distributed Ledgers as a Support System for Digital Evidence Management” Prof. Dr. Şeref SAĞIROĞLU Gazi University – TR 11.06.2019 / TUESDAY / 11.30 – 12.30 / AUDITORIO "Cyber Security and Big Data Issues in Turkey” V
Dr. Nuno Ricardo Mateus Coelho University of Trás os Montes e Alto Douro 11.06.2019 / TUESDAY / 14.00 – 15.00 / AUDITORIO “Information Security Challenges – A Paranoid Operative System Perspective” VI
SYMPOSIUM PROGRAM 7th International Symposium on Digital Forensics and Security (ISDFS 2019 Schedule) 10.06.2019 MONDAY 13:00-14:00 REGISTRATION OPENING CEREMONY (AUDITORIO) 14:00-14:30 Prof. Dr. Maria Manuela Cruz-Cunha Prof. Dr. Asaf Varol KEYNOTE SPEECH (AUDITORIO) 14:30-15:30 Prof. Dr. Peter Alan Cooper "Distributed Ledgers as a Support System for Digital Evidence Management" 15:30-16:00 COFFEE BREAK Peer-reviewed Presentations / PARALLEL SESSIONS AUDITORIO SALA - 1 SALA - 2 16:00-18:00 Information Security Data Privacy & Cryptography Computer Science P_ID: 25-26-38-42-69*-72 P_ID: 10*-19*-23-48-61-68 P_ID: 5-20*-32-33-55-58 19:00-21:00 GALA DINNER 11.06.2019 TUESDAY Peer-reviewed Presentations / PARALLEL SESSIONS AUDITORIO SALA - 1 SALA - 2 09:30-11:00 Information Security Digital Forensics Computer Science P_ID: 35-40*-47-50-52-62* P-ID: 9*-45-46*-59-65-73 P_ID: 4*-21-43-51*-56-64-74 11:00-11:30 COFFEE BREAK KEYNOTE SPEECH (AUDITORIO) 11:30-12:30 Prof. Dr. Şeref SAĞIROĞLU "Cyber Security and Big Data Issues in Turkey" 12:30-14:00 LUNCH KEYNOTE SPEECH (AUDITORIO) 14:00-15:00 Dr. Nuno Ricardo Mateus Coelho "Information Security Challenges – A Paranoid Operative System Perspective" 15:00-15:30 COFFEE BREAK Peer-reviewed Presentations / PARALLEL SESSIONS AUDITORIO SALA - 1 (Online Presentations) SALA - 2 15:30-17:30 Digital Forensics Information Security* Computer Science P-ID: 1-12-13-34*-36-37 P_ID: 14-24-31-41-53-71-75-83 P_ID: 44-49-51*-54*-76-77-78-82 17:30-18:00 CLOSING CEREMONY (AUDITORIO) 12.06.2019 WEDNESDAY SOCIAL EVENT/ Trip to Braga or Porto 09:30-17:00 (Additional Charges will apply) * On-line/Video Presentations VII
TABLE OF CONTENTS A Comparative Study of COAP And MQTT Communication Protocols Samer Hamdani, Hassan Sbeyti ................................................................................................................................... 01 A Four-Step Method for Investigating Network Worm Propagation Tala Tafazzoli, Babak Sadeghiyan ................................................................................................................................ 01 A New Approach for Exiting from Parking Lot based on Artificial Neural Network Halil Öztürk, Sevginur Teke, Murat Karabatak ............................................................................................................. 02 A New Model for Creating Layer Planes Using Steganography for Text Hiding Shalaw Mshir, Asaf Varol ............................................................................................................................................. 02 A Novel Hybrid Image Encryption Algorithm Based on Data Compression and Chaotic Key Planning Algorithms Yücel Bürhan, Fırat Artuğer, Fatih Ozkaynak ............................................................................................................... 02 A Research on Security Vulnerabilities in Online and Mobile Banking Systems Nilay Yıldırım, Asaf Varol .............................................................................................................................................. 03 A Review Paper on Cryptography Abdalbasit Mohammed Qadir, Nurhayat Varol ........................................................................................................... 03 A Security-Enhanced Interoperability Middleware for the Internet of Things Hunor Sándor, Béla Genge, Piroska Haller, Andrei Bica ............................................................................................... 03 A Statistical Modulation Type Identifier for Remote Keyless Entry Transmitters Based on Extended Energy Detector Özgür Alaca, Ali Boyacı, Serhan Yarkan, Muhammet Ali Aydın .................................................................................... 04 A Stenography Application for Hiding Student Information into an Image Yıldıray Yiğit, Murat Karabatak .................................................................................................................................... 04 A Survey On Backbone Attack Ebu Yusuf Güven, Mehmet Yavuz Yağcı, Ali Boyacı, Serhan Yarkan, Muhammet Ali Aydın ......................................... 05 A Target Tracking Application On Mobese Videos Sevinç Ay, Murat Karabatak ......................................................................................................................................... 05 A Trust Management Model for IoT Ahmed Abdlrazaq, Serkan Varol................................................................................................................................... 06 Advantages to Disadvantages of Cloud Computing for Small-Sized Business Peshraw Ahmed Abdalla, Asaf Varol ............................................................................................................................ 06 An Integrated Framework to Examine Mobile Users’ Pathway from Threat Cognition to Action Noushin Ashrafi, Daniel Lee, Jean-Pierre Kuilboer, G. Christoph Schütz ...................................................................... 06 Analysis of Malware Hidden Behind Firewalls with Back Scans Zhiqing Zhang, Hiroshi Esaki, Hideya Ochiai ................................................................................................................ 07 Analysis of Realistic Attack Scenarios in Vehicle Ad-hoc Networks Jan Lastinec, Mario Keszeli........................................................................................................................................... 07 Android Mobile Device Forensics: A Review Hussein Farooq Tayeb, Cihan Varol .............................................................................................................................. 08 VIII
Application of Similarity-Based Image Steganography Method to Computerized Tomography Images Songül Karakuş, Engin Avcı .......................................................................................................................................... 08 Augmenting Gabor-based Face Recognition with Global Soft Biometrics Emad Sami Jaha ........................................................................................................................................................... 09 Capacity of Adaptive Free Space Optical Transmission over Malaga Turbulence with Pointing Error using Truncated Channel Inversion Dejan Milić, Marko Smilić, Bojana Nikolić, Milan Tuba, Petar Spalević........................................................................ 09 Chaotic Analysis of Radon Gas (222Rn) measurements in Lesvos Island: Detrended Fluctuation Analysis (DFA) Miraç Kamışlıoğlu, Feride Kulalı ................................................................................................................................... 10 Circle Map for Internet of Things Networks Peter Szabo, Bela Genge .............................................................................................................................................. 10 Clustering Algorithm Optimized by Brain Storm Optimization for Digital Image Segmentation Eva Tuba, Raka Jovanovic, Dejan Zivkovic, Marko Beko, Milan Tuba .......................................................................... 10 Comparison of Zigbee, Z-Wave, Wi-Fi, and Bluetooth Wireless Technologies Used in Home Automation Salim Jibrin Danbatta, Asaf Varol................................................................................................................................. 11 Continuous Authentication Based on User Interaction Behavior Long Chen, Yi Zhong, Weidong Ai, Difang Zhang ......................................................................................................... 11 Defending Against Cyber-Attacks on the Internet of Things Ghazi Abdalla Abdalrahman, Hacer Varol.................................................................................................................... 12 Determining the Effectiveness of Data Remanence Prevention in the Aws Cloud Bradley Lee Snyder, James H. Jones ............................................................................................................................. 12 Digital Forensics: Focusing on Image Forensics Rayan Sulaiman Khalaf, Asaf Varol .............................................................................................................................. 13 Electronic Datas and Forgery of Documents Offenses İhsan Baştürk, Çetin Arslan .......................................................................................................................................... 13 Enhancing Security of SDN Focusing on Control Plane and Data Plane Barbora Čelesová, Jozef Vaľko, Rudolf Grežo, Pavol Helebrandt.................................................................................. 14 Experience of Incorporating NIST Standards in a Digital Forensics Curricula Sankardas Roy, Yan Wu, Kristina N. LaVenia ............................................................................................................... 14 Face Verification and Recognition for Digital Forensics and Information Security Giuseppe Amato, Fabrizio Falchi, Claudio Gennaro, Fabio Valerio Massoli, Nikolaos Passalis, Anastasios Tefas, Alessandro Trivilini, Claudio Vairo ................................................................................................................................ 15 Feature Extraction of ECG Signal by using Deep Feature Aykut Diker, Engin Avcı ................................................................................................................................................ 15 Human vs Bots: Detecting Human Attacks in a Honeypot Environment Shreya Udhani, Alexander Withers, Masooda Bashir................................................................................................... 15 Image and Video Processing Applications Using Xilinx System Generator Sertaç Yaman, Merve Yıldırım, Bircan Kamışlıoğlu, Yavuz Erol, Hasan Kürüm ............................................................. 16 Information Security Awareness of School Administrators Songül Karabatak, Murat Karabatak ........................................................................................................................... 16 IX
Legal and Technical Aspects of Web Forensics Yeşim Ülgen Sönmez, Asaf Varol .................................................................................................................................. 17 Measuring the Effects of Emojis on Turkish Context in Sentiment Analysis Çağatay Ünal Yurtöz, İsmail Burak Parlak .................................................................................................................... 17 Multidimensional Signal Interpolation based on Parametric Space Dimension Reduction Mikhail Gashnikov ........................................................................................................................................................ 18 New Trends in Speech Emotion Recognition Yeşim Ülgen Sönmez, Asaf Varol .................................................................................................................................. 18 Overview of Machine Learning Methods for Android Malware Identification João Lopes, Carlos Serrão, Luís Nunes, Ana Almeida, João Oliveira ............................................................................. 19 Parameter Space Dimension Reduction for Multidimensional Signals Differential Pulse-Code Modulation Interpolator Aleksey Maksimov, Mikhail Gashnikov ........................................................................................................................ 19 Performance Comparison of Classification Algorithms for The Diagnosis of Mastitis Disease in Dairy Animals Erkan Tanyıldızı, Gökçe Yıldırım.................................................................................................................................... 19 Performance Comparison of New Fast Weighted Naïve Bayes Classifier with Other Bayes Classifiers Gamzepelin Aksoy, Murat Karabatak........................................................................................................................... 20 Predicting Daily Activities Effectiveness Using Base-level and Meta level Classifiers Mohammad Akour, Shadi Banitaan, Hiba Alsghaier, Khalid Al Radaideh .................................................................... 20 Predicting Stealthy Watermarks in Files Using Deep Learning Maha F Sabir, James Jones, Hang Liu, Alex V Mbaziira ................................................................................................ 21 Problems and Prospects of Anti-Theft and Mobile Phone Tracking: A Case in Nigeria Iliyasu Yahaya Adam, Cihan Varol, Asaf Varol ............................................................................................................. 21 Prototype of A Paranoid Mobile Operating System Distribution Nuno Mateus Coelho, Miguel Peixoto, Maria Manuela Cruz Cunha ............................................................................ 22 Refactoring Code Clone Detection Zhala Sarkawt Othman, Mehmet Kaya ........................................................................................................................ 22 Review of Chaotic Based S-Box Structures Ayşe Cengiz, Derya Avcı................................................................................................................................................ 22 SCADA Testbed for Vulnerability Assessments, Penetration Testing and Incident Forensics Sundar Krishnan, Mingkui Wei ..................................................................................................................................... 23 Securing Database Management Systems using RAM Serial Numbers Sapan Noori Azeez, Serkan Varol ................................................................................................................................. 23 Security Enhancement in Storage Area Network Souheil Chukry, Hassan Sbeyti...................................................................................................................................... 24 Semi-Fragile Watermarking for JPEG Image Authentication: A Comparative Study Anna Egorova, Victor Fedoseev .................................................................................................................................... 24 SmartThings Event Export using SmartApps Jose Garcia, Cihan Varol ............................................................................................................................................... 24 X
Speculative Execution Attack Methodologies(SEAM) : An overview and component modelling of Spectre, Meltdown and Foreshadow attack methods Andrew Johnson, Ross Davies ...................................................................................................................................... 25 Temperature Estimation with Time Series Analysis from Air Quality Data Set Zeynep Özpolat, Murat Karabatak ............................................................................................................................... 25 Thwarting C2 Communication of DGA-Based Malware using Process-level DNS Traffic Tracking Anjali Menon ................................................................................................................................................................ 26 User Profiling Based on Application-Level Using Network Metadata Faisal Shaman, Bogdan Ghita, Nathan Clarke, Abdulrahman Alruban ........................................................................ 26 XI
ABSTRACTS Paper ID: 054 A Comparative Study of COAP and MQTT Communication Protocols Samer Hamdani, Hassan Sbeyti* *Arab Open University Lebanon *Email: hsbeity@aou.edu.lb Abstract—Internet of things (IOT) technology consists of nonstop data emitter small devices, sensor nodes and gateways. Structured and unstructured data delivered mainly through internet connection, cause heterogeneous and enormous data transmission. The IOT ecosystem is a composition of heterogeneous smart objects like actuators; sensors having the main purpose of insuring the interconnectivity of all its components that functions in our daily industrial and educational life, as well as our daily security. In addition toIOT devices allowing the monitoring of humans, they also are interacting together like mobile devices, health monitor gadgets, heart beat integrated sensors, fitness bands, Patient Workup and surgical Medical Equipment. This myriad of devices highlights the challenge of how to accomplish all these goals with the tiny capabilities, since all of them are equipped with light resources with affordability limitations, in addition to little power sources availability (devices that might need to function for years with being recharged). Scalability is main purpose for an efficient IOT ecosystem. At devices level this efficiency could be accomplished mainly through three essential factors: energy, resources and network usage to support the large amount of bandwidth transmitted by the overall systems devices. Here appears the important role of communication protocol stack that main ruin these tiny devices resources while transmitting large bandwidth data, insuring data delivery, uncontrollable latency or scattered inefficient iterating processes. In this paper, we have designed and implemented two client applications: first based on Message Queue Telemetry Transport (MQTT) and the second on Constrained Application Protocol (CoAP) in order to monitor and compare the impact of these two communications over IOT eco system functionality, alongside energy consumption, resources usage on devices, latency and data bandwidth produces over network. Paper ID: 034 A Four-Step Method for Investigating Network Worm Propagation Tala Tafazzoli*, Babak Sadeghiyan *ICT Research Institute (ITRC) *Email: tafazoli@itrc.ac.ir Abstract—Worm origin identification and propagation path reconstruction are important topics in information security and digital forensics. This information helps forensic investigators to guess initial suspects and do further investigations on the suspicious computers. Network and system administrators also use the information to identify security weaknesses of their systems and networks. The goal of this paper is to identify the origins and to reconstruct the propagation path of preferential scanning worm back-in-time. The main idea of this paper is to use back-to-origin modeling and a step-by-step improvement, to identify the origins and to reconstruct the propagation path after the worm outbreak using information gathered over the network. We construct a probabilistic model to receive features over the network and estimate infection status of nodes. We also developed an algorithm that identifies the origins and reconstructs the propagation path, back-in-time using the learned model. In order to achieve this, we used a 4-step method. The proposed method has acceptable accuracy. 1
Paper ID: 082 A New Approach for Exiting from Parking Lot based on Artificial Neural Network Halil Öztürk, Sevginur Teke*, Murat Karabatak *Fırat University *Email: sevginurteke@gmail.com Abstract— As a result of developing technology, autonomous vehicle systems have become very important. One of the biggest problems of these vehicles is entering parking lots and exiting from parking lots. As well as parallel parking and vertical parking problems, exiting from a parking lot can also be a problem in some cases. In this paper, it is aimed to find a solution to the problem of exiting the vehicles from the parking lot. Due to the location and structure of the parking lots, it can be difficult to exit from a parking lot for a vehicle. In this study, data such as speed, wheel angle and position of the vehicle were obtained from the vehicle and it is aimed to automatically exit from the parking lot. Artificial Neural Network was used to perform this procedure. The modelling results show that it is possible for a vehicle to exit autonomously from the parking lot. Paper ID: 019 A New Model for Creating Layer Planes Using Steganography for Text Hiding Shalaw Mshir*, Asaf Varol * Fırat University *Email: Shalaw.00115594@gmail.com Abstract— Steganography is the art and science of hiding messages in a secret way such that only the sender and receiver know. This allows one party to communicate with another without a third party knowing that the connection is taking place. Here, the data is hidden inside a safe “cover”, where even if a third party can capture the cover, there will be nothing to show what data is hidden inside. Meanwhile, the cover can be an image, sound, video or document. Steganography has two primary aspects: security – whether the hidden data is perceptible by either a person or a computer; and capacity – how much data can be hidden in a given cover file. Because the system works within a spatial domain, it can hide a large amount of information, while embedding and extraction processes require less time in terms of execution than methods using transform domains. This paper explains how to use steganography through a modern technique with a practical understanding. Paper ID: 061 A Novel Hybrid Image Encryption Algorithm Based on Data Compression and Chaotic Key Planning Algorithms Yücel Bürhan, Fırat Artuğer, Fatih Özkaynak* *Fırat University *Email: ozkaynak@firat.edu.tr Abstract—In this study, a hybrid image encryption algorithm which provides data compression and encryption requirements is proposed. Both JPEG and fractal compression algorithms can be used in the data compression process of the proposed new algorithm. In the encryption process, a chaotic key planning algorithm has been used. Chaotic systems are used as an entropy source. This approach, based on the one time pad principle, is unconditionally secure because it uses different secret keys in each encryption process. Successful analysis results show that the proposed new method can be used in many practical applications in the field of information security. 2
Paper ID: 072 A Research on Security Vulnerabilities in Online and Mobile Banking Systems Nilay Yıldırım*, Asaf Varol *Fırat University *Email: nilyildirim87@gmail.com Abstract—Mobil and online banking becomes one of the most important technologies that will not lose its popularity with new technology features added every day for the convenience of the user. Most of the financial companies offer mobile and online banking applications to their customers. Security, privacy and customer privacy in online and mobile banking have become important. Security risks in mobile and online banking, especially in mobile banking is a major problem for the banks and the users because of the innovations brought by the technology and security gaps in every innovation. The banking system offers various security solutions for mobile and online banking security. In this research paper, security threats and security measures in mobile and online banking systems are examined. Paper ID: 010 A Review Paper on Cryptography Abdalbasit Mohammed Qadir, Nurhayat Varol* *Fırat University *Email: nurhayat_varol@gmail.com Abstract—With the internet having reached a level that merges with our lives, growing explosively during the last several decades, data security has become a main concern for anyone connected to the web. Data security ensures that our data is only accessible by the intended receiver and prevents any modification or alteration of data. In order to achieve this level of security, various algorithms and methods have been developed. Cryptography can be defined as techniques that cipher data, depending on specific algorithms that make the data unreadable to the human eye unless decrypted by algorithms that are predefined by the sender. Paper ID: 052 A Security-Enhanced Interoperability Middleware for the Internet of Things Hunor Sándor*, Béla Genge, Piroska Haller, Andrei Bica * Kalos Information Systems *Email: hunor.sandor@kalosis.com Abstract—This paper documents an Internet of Things (IoT) middleware specially tailored to address the security, and operational requirements expected from an effective IoT platform. In essence, the middleware exposes a diverse palette of features, including authentication, authorization, auditing, confidentiality and integrity of data. Besides these aspects, the middleware encapsulates an IoT object abstraction layer that builds a generic object model that is independent from the device type (i.e.,hardware, software, vendor). Furthermore, it builds on standards and specifications to accomplish a highly resilient and scalable solution. The approach is tested on several hardware platforms. A use case scenario is presented to demonstrate its main features. The middleware represents a key component in the context of the “GHOST - Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control” project. 3
Paper ID: 068 A Statistical Modulation Type Identifier for Remote Keyless Entry Transmitters Based on Extended Energy Detector Özgür Alaca*, Ali Boyacı, Serhan Yarkan, Muhammet Ali Aydın * Istanbul Commerce University *Email: oalaca@ticaret.edu.tr Abstract—Remote keyless entry (RKE) systems are an integral part of modern daily life. Vehicle access, drive authorization, and arming/disarming the alarm systems for houses, garages, and/or facilities are instances for popular uses of RKE. Despite their obvious advantages such as gaining access/authorization solely by carrying them, any security breach experienced with remote keyless entrys (RKEs) could end up with cataclysmic consequences. Therefore, manufacturers continuously develop new methods and techniques to fortify their RKEs systems. One of the prominent ways of tackling the inherent security concern is to establish a rapid wireless message exchange mechanism/protocol such that intruders could not have time to place their attacks. However, with recent advances in digital technology along with software–defined radio (SDR), quantification of rapidness becomes crucial for RKE manufacturers. Therefore, in this study, a statistical modulation type identifier for RKEs systems is proposed. Both an automatic modulation type identifier based on complex baseband equivalent of the received signal and an automatic mode detector are employed as an extension of traditional energy detector. This way, presumable bottlenecks for the receiver at intruderside are identified and elaborated. Measurement results are provided along with relevant discussions. Results demonstrate that frequency compensation along with energy detection are the two indispensable serial modules and provide the bottleneck for any receiver at intruder’s side. Paper ID: 071 A Stenography Application for Hiding Student Information into an Image Yıldıray Yiğit, Murat Karabatak* *Fırat University *Email: mkarabatak@firat.edu.tr Abstract— Information security is a major problem today. Different approaches and methods are introduced every day for data protection. One of them is steganography. The word steganography combines the Greek words steganos (στεγανός),meaning "covered, concealed, or protected," and graphein (γράφειν) meaning "writing". The purpose of steganography is to construct the stego object by placing important information invisible into the ordinary cover object (image, sound, video, text, etc.) and to transmit it to the recipient. In this study, it is aimed to strengthen the LSB technique which is one of the steganography methods by suggesting the use of mask which will provide the least change on the image while hiding the data into a digital image. In the proposed method, the data is also compressed by the LZW algorithm, thus allowing more data to be hidden. 4
Paper ID: 069 A Survey On Backbone Attack Ebu Yusuf Güven*, Mehmet Yavuz Yağcı, Ali Boyacı, Serhan Yarkan, Muhammet Ali Aydın * Istanbul University - Cerrahpaşa *Email: eyguven @istanbul.edu.tr Abstract—The Internet is the universal network infrastructure that surrounds the Earth with thousands of devices and connections that make up it. The communication of various technologies from data centers to personal smartphones is provided through this infrastructure. While end devices are renewed as technology and product in short periods, network devices such as switches and routers, where communication is provided, can work for many years and work with out-of-date software and protocols. Therefore, it is clear how important the weaknesses are. Internet communication protocols are designed with security concerns in mind instead of communication speed and bandwidth. Even though researchers work intensively on wireless networks, the security of the infrastructure that connects wireless networks is ignored. In this study, we examined the attacks on OSI layer 2 and layer 3 layers made to the devices that constitute the backbone of the Internet infrastructure. Although several security measures and updates have been published for some of these attacks, the vulnerabilities that may occur in outdated devices are revealed. Paper ID: 078 A Target Tracking Application On Mobese Videos Sevinç Ay*, Murat Karabatak *Fırat University *Email: say@firat.edu.tr Abstract—The development of digital communication and image technologies is becoming increasingly widespread. The high resolution rates used in image technologies increased the quality of the recordings. These developments reveal the necessity of interpretation studies on digital images. Image processing applications were first created by the interpretation of still images. In order to achieve better image processing after the stages of obtaining, improving and decontamination of the image, certain features have been determined and highlighted. Nowadays, it continues with the processing and interpretation of moving images or videos. In recent studies, object tracking has gained importance in order to interpret visual inspection systems. 5
Paper ID: 041 A Trust Management Model for IoT Ahmed Abdlrazaq*, Serkan Varol *Fırat University *Email: Ahmed.abdulfattah87@gmail.com Abstract—The Internet of Things (IoT) is profoundly influencing our daily lives in many areas, covering small devices to large network systems. An IoT system may be a set of directing rules that rearranges the usage of IoT applications. This paper details a trust management model and security of IoT systems. Trust management models and security play a critical part in IoT to protect information and devices from attacks since it supplies security for all layers and networks. This review focuses on how a trust management model has a significant function in IoT in enhancing reliability, privacy, and security. In this survey, we explained the challenges along with the solutions in terms of IoT security and privacy and recognized the main security problem in the IoT framework. In addition, this paper explored the characteristics of trust and pointed out some IoT security challenges, explaining how middleware can affect the security of IoT. Paper ID: 075 Advantages to Disadvantages of Cloud Computing for Small-Sized Business Peshraw Ahmed Abdalla*, Asaf Varol *Fırat University *Email: peshraw.abdalla1991@gmail.com Abstract— This paper presents a complete overview of the storage landscape and cloud computing. It explains the majör advantages and disadvantages of storing data online using cloud storage, how this works, and the basic concepts involved in cloud computing, while also demonstrating the layers of its architecture with reference to the Infrastructure as a Service (IaaS) that contains the cloud storage architecture. The paper further discusses the concept of Storage as a Service (StaaS), which lets users or clients utilize cloud storage to save data by providing them space without them having to use physical storage. Paper ID: 050 An Integrated Framework to Examine Mobile Users’ Pathway from Threat Cognition to Action Noushin Ashrafi, Daniel Lee, Jean-Pierre Kuilboer*,G. Cristoph Schütz *University of Massachusetts Boston *Email: jeanpierre.kuilboer@umb.edu Abstract—The upsurge in usage of mobile devices together with significant growth in security threats has led to pervasive harm both in organizational and personal levels. The perilous rise in security threats is mostly due to a huge amount of sensitive information stored and transmitted on digital devices and intensified by inadequate security practices. The Protection of information assets is often contingent on the behavior and activities of the users leading to the establishment of a subfield of information security known as behavioral information security (InfoSec). This study presents an all-encompassing yet pragmatic view of mobile user’s security-related behavior while attempting to respond to scholars’ critiques regarding the incompleteness of extant behavioral InfoSec research. A careful review of prospects to enhance the previous approaches lead to an integrated model featuring interrelated deliberations. Interesting and strong results of our integrated model should validate the efficacy of the hypotheses and add value to the research stream in the field of behavioral InfoSec. 6
Paper ID: 026 Analysis of Malware Hidden Behind Firewalls with Back Scans Zhiqing Zhang*, Hiroshi Esaki, Hideya Ochiai *The University of Tokyo *Email: cyou@hongo.wide.ad.jp Abstract—Malware infection and propagation in Local Area Network(LAN) have became a critical security consideration in IoT systems. Recent cases happen when hosts are observed to be infected even protected by firewall. If we go deep into the analysis on infected hosts, we can measure on the possibility of this situation. When we are aware of status of ports on the source host, we can determine how intrusion happens based on classification on manner of infection. We propose SB-MSS (scan back to malicious source scan source), a network measurement method on malware behaviors in infection on hosts even protected by firewall. This includes passive analysis and active back scan,i.e., port back scanning and vertical back scanning methods towards malicious sources. We conducted 2-week experiment and provide our results in attack distribution on different factors, possible port entrances for malware intrusion and classification result on different infection type. We found in 82.52% cases, malware infection bypasses firewalls. Paper ID: 047 Analysis of Realistic Attack Scenarios in Vehicle Ad-hoc Networks Jan Lastinec*, Mario Keszeli *Slovak University of Technology in Bratislava (STU) *Email: jan.lastinec@stuba.sk Abstract—The pace of technological development in automotive and transportation has been accelerating rapidly in recent years. Automation of driver assistance systems, autonomous driving, increasing vehicle connectivity and emerging inter-vehicular communication (V2V) are among the most disruptive innovations, the latter of which also raises numerous unprecedented security concerns. This paper is focused on the security of V2V communication in vehicle ad-hoc networks (VANET) with the main goal of identifying realistic attack scenarios and evaluating their impact, as well as possible security countermeasures to thwart the attacks. The evaluation has been done in OMNeT++ simulation environment and the results indicate that common attacks, such as replay attack or message falsification, can be eliminated by utilizing digital signatures and message validation. However, detection and mitigation of advanced attacks such as Sybil attack requires more complex approach. The paper also presents a simple detection method of Sybil nodes based on measuring the signal strength of received messages and maintaining reputation of sending nodes. The evaluation results suggest that the presented method is able to detect Sybil nodes in VANET and contributes to the improvement of traffic flow. 7
Paper ID: 009 Android Mobile Device Forensics: A Review Hussein Farooq Tayeb*, Cihan Varol *Fırat University *Email: husseintaeyb@gmail.com Abstract— Mobile device forensics is an up-to-date multidisciplinary methodology aims at Identifying, preserving, extracting, analyzing, and presenting digital evidence from mobile devices. The technique encompasses various phases, which require both deep insights into mobile devices’ organization and structure as well as digital analysis and examination approaches. Modern mobile devices enable multitask computing ability that requires a suitable Operating System (OS). Nowadays, both proprietary and open source operating mobile OSs are available. The progressive growth of Android operated devices makes them a potential target for cyber-attacks. In this paper, a review of the Android mobile device forensics is presented. The study is not an exhaustive review, rather it only offers a discussion of the most influential papers in the field. Paper ID: 023 Application of Similarity-Based Image Steganography Method to Computerized Tomography Images Songül Karakuş*, Engin Avcı *Fırat University *Email: songul4444@gmail.com Abstract—With the rapid development of technology, computers have got in every area of our lives. One of these areas is the area of health. Medical records are now stored in computer environments and can be accessed if needed. Nowadays, thanks to internet technologies, access to information has been facilitated, and this has brought security problems with malicious users. Using computed tomography images in this study, doctor reviews are hidden in these images. For this purpose, similarity based least significant bit method was used. While hiding the reviews of the doctor, three different messages were concealed with the capacity of hiding, applied directly to the hiding and NOT to the reviews to be hidden. The mean square error and peak signal to noise ratio metrics were used as performance evaluation criteria. As a result, the peak signal to noise ratio value of the lowest message hiding capacity (961 bytes) was found as 71.4408, applied to the original reviews, while the peak signal to noise ratio value was found to be 71.0473, applied to the inverted reviews. 8
Paper ID: 025 Augmenting Gabor-based Face Recognition with Global Soft Biometrics Emad Sami Jaha* *King Abdulaziz University *Email: ejaha@kau.edu.sa Abstract—Though face recognition using traditional (hard) biometrics has attracted massive research interest and received extensive studies, it still confronts degrading variability challenges and notably achieves lower performance compared with other biometric recognition forms like fingerprint and iris. Recently, a number of research studies have been interested in enhancing face recognition performance by all means of supplementary facial biometric traits or other biometric modalities. Thus, soft biometrics have been emerged as a new promising modality of biometrics and highlighted as likely viable and fusible traits for augmenting traditional/hard biometrics. This is due to the expected advantages of soft biometrics over the traditional biometric traits, such as the high collectability and invariance properties. Other than fusing different kinds of traditional traits to augment face recognition, adding soft biometrics to augment various traditional facial traits has yet gained little research attention. Hence, in this research, unlike the majority of existing work, we investigate the viability of global soft face biometrics in supplementing traditional (hard) biometrics and the efficacy of concurrently using absolute and relative descriptions as soft biometrics. We conduct a new soft biometric-based fusion scheme in feature-level for augmenting a traditional Gabor-based face identification/verification in different potential forensic scenarios, considering performance variability evaluation and comparison with the baseline performance of Gabor features in isolation. Paper ID: 043 Capacity of Adaptive Free Space Optical Transmission over Malaga Turbulence with Pointing Error using Truncated Channel Inversion Dejan Milić, Marko Smilić, Bojana Nikolić, Milan Tuba*, Petar Spalević *Singidunum University *Email: mtuba@singidunum.ac.rs Abstract— In this paper we consider channel capacity based on Truncated Channel Inversion with Fixed Rate (TIFR) adaptive transmission over Malaga model of atmospheric turbulence with pointing error. Analytical expressions in closed form are derived for capacity based on TIFR adaptive transmission. The impact of cut- off SNR level on channel capacity based on TIFR adaptive transmission is investigated. Also, value of cut-off SNR level for different regimes of transmitter power is considered. Analytical results are numerically evaluated and graphically presented depending on cut-off SNR level and signal to noise ratio (SNR). 9
Paper ID: 058 Chaotic Analysis of Radon Gas (222Rn) measurements in Lesvos Island: Detrended Fluctuation Analysis (DFA) Miraç Kamışlıoğlu*, Feride Kulalı *Üsküdar University *Email: mirac.kamislioglu@uskudar.edu.tr Abstract— Numerous investigations have been performed to establish a correlation between earthquakes and the geological parameters. Radon is one of the general criterions that is referred for the examination of this correlation. Chaotic signal processing methods has a very important explain of complex dynamical system for example earthquakes. Scale analyses technique, Detrended Fluctuation Analysis (DFA), has similar exponents with RMS (Root Mean Square). Hurst exponent is an enormous method to prediction long-range power law. Multifractal time series have both excessively great and little ripple. Made in this study, Detrended Fluctuation Analysis was performed for 222Rn data that was gathered from Lesvos Island in Greece. The results of Detrended Fluctuation Analysis have a robust correlation for each 222Rn time series. Paper ID: 049 Circle Map for Internet of Things Networks Peter Szabo*, Bela Genge *University of Medicine, Pharmacy, Sciences and Technology *Email: peter@kaizen-ux.com Abstract— We have reviewed the existing metro network mapping solutions. While none of them are ideal for IoT network mapping, the research on network map usability aspects can be applied to IoT networks. By doing so, we were able to come up with a new map type, tailored to IoT networks. We have created and optimized an algorithm to create and plot this new map type, the circle map. We have used B´ezier curves to connect nodes, arranged in recursive circular patterns. Overall, the circle map needs some refinement and real user research before realworld application, but its core concepts seem to work, and our algorithm efficiently creates circle maps. Paper ID: 044 Clustering Algorithm Optimized by Brain Storm Optimization for Digital Image Segmentation Eva Tuba*, Raka Jovanovic, Dejan Zivkovic, Marko Beko, Milan Tuba *Singidunum University *Email: etuba@ieee.org Abstract— In the last several decades digital images were extend their usage in numerous areas. Due to various digital image processing methods they became part areas such as astronomy, agriculture and more. One of the main task in image processing application is segmentation. Since segmentation represents rather important problem, various methods were proposed in the past. One of the methods is to use clustering algorithms which is explored in this paper. We propose k-means algorithm for digital image segmentation. K-means algorithm’s well known drawback is the high possibility of getting trapped into local optima. In this paper we proposed brain storm optimization algorithm for optimizing k-means algorithm used for digital image segmentation. Our proposed algorithm is tested on several benchmark images and the results are compared with other statof- the-art algorithms. The proposed method outperformed the existing methods. 10
You can also read