Accepted Papers

  • CERT Strategy to Deal with Phishing Attacks
    Shahrzad Sedaghat, Jahrom University, Iran

    Every day, internet thieves employ new ways to obtain personal identity people and get access to their personal information. Phishing is a somehow complex method that has recently been considered by internet thieves. First, thepresent study aims to explainphishing, andwhy an organization should deal with it and its challenges of providing. In addition, different kinds of this attack and classification of security approaches for organizational and lay users are addressed in this article. Finally, the CERT strategy-which relies on three principles of informing, supporting and helping- is presented to deal with phishing and studying some anti-phishing.

  • FGEPT: Improving Data Privacy using Fine-Grained Encryption and Perturbation Based Techniques
    Esraa A. Elwan, Mohamed Elkawkagy and Arabi Keshk, Menofyia University, Egypt

    Data privacy is a big challenge in every field, and it plays a major role in many fields such as healthcare field. The privacy of the individuals' personal information and sensitive data is critical and must to be secure. The current privacy preserving techniques as encryption whether full encryption or fine-grained encryption has some flaws. Through this paper, we will present a novel technique to maintain the privacy of the individuals and more secure than other privacy preserving techniques. The proposed technique combines the fine-grained encryption technique with the proposed perturbation technique. The fine-grained encryption technique is used to encrypt sensitive attributes and keep it secure. On the other side, the proposed perturbation technique is used to add a small amount of random noise to quasi-identifier to increase the security of data and prevent disclosure it by linking with other external data.

  • The Influence Select feature On TheClustering Algorithm
    MaysamToghraee, Farhad rad, Hamid parvin and mohammad esmaeili, Islamic Azad University, Iran

    Today, with advances in science and technology tools, the ability to monitor and store important data has been provided with a large volume, the need for scientific search and receive the data useful result have been necessary, data mining auto searching large data sources to find patterns dependence simple statistical analyzes are not able to do it. The aim of this study was to in the extent of predictive data mining in medical science and offer a framework for creating, evaluating and exploiting data mining models in the field. Previous research has found that where the difference data evaluation methods are not able to consider, therefore, we proposed a new approach for assessing the similarity of the data diversity and stability of his choice. So meta cluster techniques we choose to make use of these and most stable among a subset of the feature of our choice.

  • Anonymous Network Security Issues: Problems and Solutions using Dummy Traffic
    Albustanji M.Yousef, Carleton University, Canada

    This paper explores the area of anonymous communications and addresses the main characteristics and challenges related to security and privacy of a communications network that could be used to provide eservices. There are many real world implementations of anonymous e-services; the Silk Road is an example of an anonymous e-service. This paper also explores the different ways networks could be configured and which techniques are used to provide anonymity while taking into account the bandwidth and latency requirements. We have explored how both low-latency MIX networks and MIX based dummy networks could provide resistance to different types of traffic analysis attacks. In this work, we have summarized relevant problems, suggested solutions to these problems and briefly introduced the HORNET network.

  • QOS Based Approach for Semantic Web Services Using the Content of OWL_S
    Fattoum Nouari, Nadia Ben seghir,University of Biskra, Algeria

    Due to the increase of published Web Services (WS), finding the suitable WS that satisfies the user goals among discovered WS still needs deep investigations. The mission of Web service discovery is to seek an appropriate Web service for a client that based on the service descriptions of WS and the service requester's requirements. Nevertheless, the standard language used for encoding service descriptions does not have the capacity to specify the capabilities of a Web service. This problem leads to an ambiguity in the service discovery process. Semantic Web Services (SWS) are a research effort to automate the usage of WS. In this paper, we propose a system that provides a semantic discovery solution using the content of OWL_S to ensure the best WS in order to meet the user”Ēs preferences using the Quality of Service (QoS). The obtained results demonstrate the effectiveness of our proposed system.