The Community for Technology Leaders
Internet Monitoring and Protection, International Conference on (2007)
San Jose, California
July 1, 2007 to July 5, 2007
ISBN: 0-7695-2911-9
TABLE OF CONTENTS
Introduction

Preface (PDF)

pp. ix

Committees (PDF)

pp. x-xv
ICIMP 1

Enriched Diagnosis and Investigation Models for Security Event Correlation (Abstract)

Stephane Ubeda , CITI INSA-Lyon/ExaProtect - ARES INRIA Project, France
Veronique Legrand , CITI INSA-Lyon/ExaProtect - ARES INRIA Project, France
pp. 1

BTM - An Automated Rule-based BT Monitoring System for Piracy Detection (Abstract)

Lucas C.K. Hui , University of Hong Kong
K.H. Pun , University of Hong Kong
K.Y. Cheng , University of Hong Kong
Pierre K.Y. Lai , University of Hong Kong
K.P. Chow , University of Hong Kong
H.W. Chan , University of Hong Kong
W.W. Tsang , University of Hong Kong
L.Y. Man , University of Hong Kong
S.M. Yiu , University of Hong Kong
C.F. Chong , University of Hong Kong
pp. 2

Phishing Phishers - Observing and Tracing Organized Cybercrime (Abstract)

Ahmad-Reza Sadeghi , Ruhr University Bochum, Germany
Felix Grobert , Ruhr University Bochum, Germany
Sebastian Gajek , Ruhr University Bochum, Germany
Dominik Birk , Ruhr University Bochum, Germany
pp. 3

An Investigation of Cybercrime-Related Online Search Behavior vs General Search Behavior (Abstract)

Jingguo Wang , State University of New York at Buffalo, Buffalo, NY
H. Raghav Rao , State University of New York at Buffalo, Buffalo, NY
Nan Xiao , State University of New York at Buffalo, Buffalo, NY
pp. 4

Monitoring Architecture for Lawful Interception in VoIP Networks (Abstract)

Olivier Festor , LORIA-INRIA, France
Radu State , LORIA-INRIA, France
Balamurugan Karpagavinayagam , LORIA-INRIA, France
pp. 5
ICIMP 2

Large Scale Activity Monitoring for distributed honeynets (Abstract)

Jerome Francois , INRIA-LORIA, France
Olivier Festor , INRIA-LORIA, France
Radu State , INRIA-LORIA, France
pp. 6

Visualisation of Network Traffic using Dynamic Co-occurrence Matrices (Abstract)

Alex Essoh , Fern Universitat in Hagen, Germany
Firoz Kaderali , Fern Universitat in Hagen, Germany
Thorsten Kisner , Fern Universitat in Hagen, Germany
pp. 7

IPv6 Anomaly Traffic Monitoring with IPFIX (Abstract)

Youngseok Lee , Chungnam National University, Daejon, Korea
Seongho Shin , Chungnam National University, Daejon, Korea
Hyeon-gu Son , Chungnam National University, Daejon, Korea
Soonbyoung Choi , Chungnam National University, Daejon, Korea
pp. 10
ICIMP 3

A Management Platform for Tracking Cyber Predators in Peer-to-Peer Networks (Abstract)

Radu State , LORIA-INRIA Lorraine, France
Isabelle Chrisment , LORIA-INRIA Lorraine, France
Remi Badonnel , LORIA-INRIA Lorraine, France
Olivier Festor , LORIA-INRIA Lorraine, France
pp. 11

Fraud/Privacy Protection in Anonymous Auction (Abstract)

Hassan Kazem , Ittihad University
Rafiqul Zaman Khan , Ittihad University
Qadeer Hasan , Ittihad University
pp. 12

Emergency Alerts as RSS Feeds with Interdomain Authorization (Abstract)

Michael J. May , University of Pennsylvania
Filippo Gioachin , University of Illinois
Ravinder Shankesi , University of Illinois
Carl A. Gunter , University of Illinois
Wook Shin , University of Illinois
pp. 13
ICIMP 4

Performance Analysis in IP over WDM Networks (Abstract)

Cebrail TASKIN , Turk Telekom Genel Mudurl?au, 06103 Ayd?nl?kevler-Ankara / TURKEY
pp. 15

On the End-to-End Delay Analysis of the IEEE 802.11 Distributed Coordination Function (Abstract)

I. Papapanagiotou , University of Patras, Greece
J.S. Vardakas , University of Patras, Greece
M.D. Logothetis , University of Patras, Greece
S.A. Kotsopoulos , University of Patras, Greece
pp. 16

Automated Discovery of Performance Envelopes (Abstract)

James Bouhana , Performance International, Inc.
Mike Tsykin , Fujitsu Australia, Ltd.
pp. 17
ICIMP 5

A Protocol to Support Multi-domain Auditing of Internet-based Transport Services (Abstract)

Frank Eyermann , Universitat der Bundeswehr Mnchen
Burkhard Stiller , University of Zurich
pp. 19

Efficient Probing Techniques for Fault Diagnosis (Abstract)

Adarshpal S. Sethi , University of Delaware
Maitreya Natu , University of Delaware
pp. 20

Modeling End-to-End Delay Using Pareto Distribution (Abstract)

Wei Zhang , Beijing University of Technology
Jingsha He , Beijing University of Technology
pp. 21

An Experimental Approach to Integrating NetFlow Flow-level Records and NLANR Packet-level Traces (Abstract)

Chi Zhang , Juniper Networks
Heidi Alvarez , Florida International University
Xun Su , Fulcrum Microsystems
Julio Ibarra , Florida International University
Bin Liu , Microsoft
pp. 22

On the Penetration of Business Networks by P2P File Sharing (Abstract)

Danny Hughes , Lancaster University, UK
James Walkerdine , Isis Forensics, Lancaster, UK
Kevin Lee , University of Manchester, UK
pp. 23
ICIMP 6

Non-repudiable service usage with host identities (Abstract)

Seppo Heikkinen , Tampere University of Technology
pp. 24

Smurf-based Distributed Denial of Service (DDoS) Attack Amplification in Internet (Abstract)

Sanjeev Kumar , University of Texas - PanAmerican, Edinburg, Texas
pp. 25

State of the art review of the existing bayesian-network based approaches to trust and reputation computation (Abstract)

Omar Khadeer Hussain , Curtin University of Technology Perth, Australia
Farookh Khadeer Hussain , Curtin University of Technology Perth, Australia
Elizabeth Chang , Curtin University of Technology Perth, Australia
pp. 26
ICGD & BC 1

Business Continuity Plan Design (Abstract)

Richard J Kepenach , Nova Southeastern University
pp. 27

Project ENSAYO: A Virtual Emergency Operations Center for Disaster Management Research, Training and Discovery (Abstract)

Greg Madey , University of Notre Dame
Michael Prietula , Emory University
Domingo Rodriguez , University of Puerto Rico-Mayaguez
Irma Becerra-Fernandez , Florida International University
pp. 31

Fingerprint Recognition (Abstract)

Gabriel Sanchez , National Polytechnic Institute, Mexico
Karina Toscano , National Polytechnic Institute, Mexico
Moises Salinas , National Polytechnic Institute, Mexico
Gualberto Aguilar , National Polytechnic Institute, Mexico
Mariko Nakano , National Polytechnic Institute, Mexico
Hector Perez , National Polytechnic Institute, Mexico
pp. 32

A Model Supporting Business Continuity Auditing and Planning in Information Systems (Abstract)

Damiano Bolzoni , University of Twente
Marco Salvato , KPMG Italia
Sandro Etalle , University of Twente
Emmanuele Zambon , University of Twente
pp. 33
ICGD & BC 2/TRACK

GPSDTN: Predictive Velocity-Enabled Delay-Tolerant Networks for Arctic Research and Sustainability (Abstract)

Lawrence Freudinger , NASA Dryden Research Center
A. Hooke , NASA JPL
L. Liu , Univ. Cincinnati, USA
W. Eisner , Univ. Cincinnati, USA
W. Ivancic , NASA Glenn Research Center
Jason LeBrun , University of California Davis
Marc Seibert , NASA Kennedy Space Center
Avri Doria , Lulea University of Technology
S. Burleigh , NASA JPL
P. Paulsen , NASA Glenn Research Center
Ben Ellis , Institute of the North
Christopher Small , BBN Technologies
Andrew Maffei , Woods Hole Oceanographic Inst.
Ward Bathrick , Raytheon
James Ferl , Chartracer
K. Hinkel , Univ. Cincinnati, USA
Kevin Fall , Intel Research
Charles Lambert , SkySentry LLC
Steven Groves , SkySentry LLC
Maria Uden , Lulea University of Technology
C. Peoples , University of Ulster
Jiang Li , Howard University
D. Pleva , NASA Glenn Research Center
Jacob Norda , Trimble Navigation Limited
Robert Bulger , Barrow Arctic Science
L. Torgerson , NASA JPL
Glenn Sheehan , Barrow Arctic Science
Steve Smith , University of Alaska at Fairbanks
A. Moore , University of Ulster
Robert Durst , Mitre Corporation
Moses Garuba , Howard University
R. Beck , Univ. Cincinnati, USA
G. Parr , University of Ulster
B. Scotney , University of Ulster
Ngoc Hoang , NAL Research Corporation
Richard Machida , University of Alaska at Fairbanks
pp. 34

Service Supplier Infrastructure for Location-based M-Commerce (Abstract)

PD Mzila , University of Zululand
SS Xulu , University of Zululand
MO Adigun , University of Zululand
pp. 35

Ex-RBAC: An Extended Role Based Access Control Model for Location-aware Mobile Collaboration System (Abstract)

Xiutao Cui , East China Normal University
Yuliang Chen , University, Baton Rouge, LA
Junzhong Gu , East China Normal University
pp. 36

Mobile Location Using Super-resolution Algorithms (Abstract)

Felipe C?tedra , Universidad de Alcala, Spain
Ra?l O. Gonz?lez-Pacheco , Telecommunication Division, IBERIA Airlines of Spain
pp. 37

Path Planning and Following Algorithms in an Indoor Navigation Model for Visually Impaired (Abstract)

Alan Marshall , Queen?s University of Belfast, UK
Hua Wu , Queen?s University of Belfast, UK
Wai Yu , Queen?s University of Belfast, UK
pp. 38

Creating a dynamic picture of network participant geospatial information in complex terrains (Abstract)

Li Li , Industry Canada Communications Research Centre (CRC), Canada
Paul Labbe , Canadian Forces Experimentation Center (CFEC), Canada
Ying Ge , Industry Canada Communications Research Centre (CRC), Canada
Louise Lamont , Industry Canada Communications Research Centre (CRC), Canada
pp. 39
ICGD & BC 3

Quantifying the Possible Financial Consequences of Failure for making a Risk Based Decision (Abstract)

Farookh Khadeer Hussain , Curtin University of Technology, Perth, Australia
Tharam S. Dillon , Curtin University of Technology, Perth, Australia
Elizabeth Chang , Curtin University of Technology, Perth, Australia
Omar Khadeer Hussain , Curtin University of Technology, Perth, Australia
pp. 40

A Model for Credential Based Exception Management in Digital Rights Management Systems (Abstract)

Jean-Henry Morin , Korea University Business School
Michel Pawlak , University of Geneva - CUI
pp. 41

State of the art review of the existing soft computing based approaches to trust and reputation computation (Abstract)

Farookh Khadeer Hussain , Curtin University of Technology Perth, Australia
Omar Khadeer Hussain , Curtin University of Technology Perth, Australia
Elizabeth Chang , Curtin University of Technology Perth, Australia
pp. 42

State of the art review of the existing PageRankTM based algorithms for trust and reputation computation (Abstract)

Omar Khadeer Hussain , Curtin University of Technology Perth, Australia
Elizabeth Chang , Curtin University of Technology Perth, Australia
Farookh Khadeer Hussain , Curtin University of Technology Perth, Australia
pp. 43
90 ms
(Ver )