skip to main content
10.1145/3442520acmotherconferencesBook PagePublication PagesiccnsConference Proceedingsconference-collections
ICCNS '20: Proceedings of the 2020 10th International Conference on Communication and Network Security
ACM2020 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ICCNS 2020: 2020 the 10th International Conference on Communication and Network Security Tokyo Japan November 27 - 29, 2020
ISBN:
978-1-4503-8903-7
Published:
13 March 2021

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Session 1 - Communication and Information System
research-article
DIDarknet: A Contemporary Approach to Detect and Characterize the Darknet Traffic using Deep Image Learning

Darknet traffic classification is significantly important to categorize real-time applications. Although there are notable efforts to classify darknet traffic which rely heavily on existing datasets and machine learning classifiers, there are extremely ...

research-article
Slow Scan Attack Detection Based on Communication Behavior

We present a novel method for detecting slow scan attacks. Attackers collect information about vulnerabilities in hosts by scan attacks and then penetrate the systems based on the collected information. Detection of scan attacks is therefore useful to ...

research-article
Open Access
Analysis on Entropy Sources based on Smartphone Sensors

Random number generator (RNG) is the basic primitive in cryptography. The randomness of random numbers generated by RNGs is the base of the security of various cryptosystems implemented in network and communications. With the popularization of smart ...

research-article
TLS Encrypted Application Classification Using Machine Learning with Flow Feature Engineering

Network traffic classification has become increasingly important as the number of devices connected to the Internet is rapidly growing. Proportionally, the amount of encrypted traffic is also increasing, making payload based classification methods ...

research-article
Towards Unsupervised Introspection of Containerized Application

Container (or containerization) as one of the new concepts of virtualization, has attracted increasing attention and occupied a considerable amount of market size owing to the inherent lightweight characteristic. However, the lightweight advantage is ...

research-article
Proof of Network Security Services: Enforcement of Security SLA through Outsourced Network Testing

Many companies outsource their network security functionality to third party service providers. To guarantee the quality of such services, a Security Service Level Agreement (SSLA) between the two parties often needs to be signed and enforced. Some ...

research-article
Outsourced Secure ID3 Decision Tree Algorithm over Horizontally Partitioned Datasets with Consortium Blockchain

Due to the capacity of storing massive data and providing huge computing resources, cloud computing has been a desirable platform to assist machine learning in multiple-data-owners scenarios. However, the issue of data privacy is far from being well ...

SESSION: Session 2 - Network and Information Security
research-article
DIDroid: Android Malware Classification and Characterization Using Deep Image Learning

The unrivaled threat of android malware is the root cause of various security problems on the internet. Although there are remarkable efforts in detection and classification of android malware based on machine learning techniques, a small number of ...

research-article
Vulnerability Analysis of the Exposed Public IPs in a Higher Education Institution

Public IP addresses from a private or public higher education institution receive large amounts of network traffic. However, the data network is vulnerable to the possibility of security attacks.

This study develops a case in a practical way based in ...

research-article
A Privacy-Preserving Framework for Surveillance Systems

The ability to visually track people present in the scene is essential for any surveillance system. However, the widespread deployment and increased advancement of video surveillance systems have raised awareness of privacy to the public, i.e., human ...

research-article
VCPEC: Vulnerability Correlation Analysis Based on Privilege Escalation and Coritivity Theory

Vulnerability correlation analysis has become a key technique in the field of vulnerability analysis, which effectively addresses the limitation of only analyzing an isolated vulnerability. Even though the existing techniques have demonstrated their ...

research-article
Identification of Spoofed Emails by applying Email Forensics and Memory Forensics

Email forensics is the subdomain of network forensics, and email spoofing is the most common type of email attack. Email spoofing is a process of creating a forged message by manipulating the sender’s email address so that it appears to the recipient ...

research-article
Locust: Highly Concurrent DHT Experimentation Framework for Security Evaluations

Distributed Hash Table (DHT) protocols, such as Kademlia, provide a decentralized key-value lookup which is nowadays integrated into a wide variety of applications, such as Ethereum, InterPlanetary File System (IPFS), and BitTorrent. However, many ...

research-article
On the predictability of biometric honey templates, based on Bayesian inference

In high level security environments, data protection and leakage prevention remains one of the main challenges. In biometric systems, its most sensitive piece of information, the template, is constantly being exchanged between its building blocks. ...

research-article
The analysis method of security vulnerability based on the knowledge graph

Given the increasingly prominent network security issues, it is of great significance to deeply analyze the vulnerability of network space software and hardware resources. Although the existing Common Vulnerabilities and Exposures (CVE) security ...

Index terms have been assigned to the content through auto-classification.

Recommendations