首页 > 最新文献

First International Conference on Availability, Reliability and Security (ARES'06)最新文献

英文 中文
Feasibility of multi-protocol attacks 多协议攻击的可行性
C. Cremers
Formal modeling and verification of security protocols typically assumes that a protocol is executed in isolation, without other protocols sharing the network. We investigate the existence of multi-protocol attacks on protocols described in literature. Given two or more protocols, that share key structures and are executed in the same environment, are new attacks possible? Out of 30 protocols from literature, we find that 23 are vulnerable to multi-protocol attacks. We identify two likely attack patterns and sketch a tagging scheme to prevent multi-protocol attacks.
安全协议的形式化建模和验证通常假设协议是隔离执行的,没有其他协议共享网络。我们研究了文献中描述的多协议攻击的存在性。给定两个或多个共享密钥结构并在同一环境中执行的协议,是否有可能发生新的攻击?在文献中的30个协议中,我们发现23个易受多协议攻击。我们确定了两种可能的攻击模式,并概述了一个标记方案,以防止多协议攻击。
{"title":"Feasibility of multi-protocol attacks","authors":"C. Cremers","doi":"10.1109/ARES.2006.63","DOIUrl":"https://doi.org/10.1109/ARES.2006.63","url":null,"abstract":"Formal modeling and verification of security protocols typically assumes that a protocol is executed in isolation, without other protocols sharing the network. We investigate the existence of multi-protocol attacks on protocols described in literature. Given two or more protocols, that share key structures and are executed in the same environment, are new attacks possible? Out of 30 protocols from literature, we find that 23 are vulnerable to multi-protocol attacks. We identify two likely attack patterns and sketch a tagging scheme to prevent multi-protocol attacks.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"346 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123416749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Diversity to enhance autonomic computing self-protection 增强自主计算的多样性自我保护
Michael Jarrett, R. Seviora
Self-protection is an attribute of autonomic computing systems, reflecting the requirement to proactively defend against attackers, and automatically detect and recover from attacks. As demonstrated by increasing numbers of Internet worms, a single previously unknown vulnerability can cause an entire infrastructure to crumble, due to software and hardware monocultures. One defence against complete failures is diversity: by utilizing differing implementations of software and hardware, the potential total damage from a single exploit is lessened. The self-deployment and self-configuration features of an autonomic computing infrastructure make it practical to use diversity as a self-protection mechanism. We explore the idea of using diversity as a factor in resource allocation decisions, showing how it could be used to limit the damage an attacker can inflict.
自我保护是自主计算系统的一种属性,反映了主动防御攻击者、自动检测攻击并从攻击中恢复的需求。正如越来越多的Internet蠕虫所证明的那样,由于软件和硬件的单一文化,单个以前未知的漏洞可能导致整个基础设施崩溃。防止完全失败的一种防御方法是多样性:通过使用不同的软件和硬件实现,减少单个漏洞造成的潜在总损害。自主计算基础设施的自部署和自配置特性使得使用多样性作为一种自我保护机制变得切实可行。我们探讨了在资源分配决策中使用多样性作为一个因素的想法,展示了如何使用它来限制攻击者可能造成的损害。
{"title":"Diversity to enhance autonomic computing self-protection","authors":"Michael Jarrett, R. Seviora","doi":"10.1109/ARES.2006.55","DOIUrl":"https://doi.org/10.1109/ARES.2006.55","url":null,"abstract":"Self-protection is an attribute of autonomic computing systems, reflecting the requirement to proactively defend against attackers, and automatically detect and recover from attacks. As demonstrated by increasing numbers of Internet worms, a single previously unknown vulnerability can cause an entire infrastructure to crumble, due to software and hardware monocultures. One defence against complete failures is diversity: by utilizing differing implementations of software and hardware, the potential total damage from a single exploit is lessened. The self-deployment and self-configuration features of an autonomic computing infrastructure make it practical to use diversity as a self-protection mechanism. We explore the idea of using diversity as a factor in resource allocation decisions, showing how it could be used to limit the damage an attacker can inflict.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121731165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Modeling permissions in a (U/X)ML world (U/X)ML世界中的建模权限
Muhammad Alam, R. Breu, M. Hafner
In this paper we present a novel approach for the specification of access rights in a service oriented architecture. Being part of the SECTET framework for model driven security for B2B-workflows, our specification language SECTET-PL for permissions is influenced by the OCL specification language and is interpreted in the context of UML models. Concerning the technological side, SECTET-PL specifications are translated into platform independent XACML permissions interpreted by a security gateway.
在本文中,我们提出了一种在面向服务的体系结构中规范访问权限的新方法。作为用于b2b工作流的模型驱动安全性的SECTET框架的一部分,我们用于权限的规范语言SECTET- pl受到OCL规范语言的影响,并在UML模型的上下文中进行解释。在技术方面,secet - pl规范被转换成由安全网关解释的独立于平台的XACML权限。
{"title":"Modeling permissions in a (U/X)ML world","authors":"Muhammad Alam, R. Breu, M. Hafner","doi":"10.1109/ARES.2006.84","DOIUrl":"https://doi.org/10.1109/ARES.2006.84","url":null,"abstract":"In this paper we present a novel approach for the specification of access rights in a service oriented architecture. Being part of the SECTET framework for model driven security for B2B-workflows, our specification language SECTET-PL for permissions is influenced by the OCL specification language and is interpreted in the context of UML models. Concerning the technological side, SECTET-PL specifications are translated into platform independent XACML permissions interpreted by a security gateway.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124231517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
A selector method for providing mobile location estimation services within a radio cellular network 一种用于在无线蜂窝网络内提供移动位置估计服务的选择器方法
Junyang Zhou, J. Ng
Mobile location estimation or mobile positioning is becoming an important service for a mobile phone network. It is well-known that GPS can provide accurate location estimation, but it is also a known fact that GPS does not perform well in urban areas like downtown New York and cities like Hong Kong. Then many mobile location estimation approaches based on radio cellular networks have been proposed to compensate the problem of the lost of GPS signals in providing location services to mobile users in metropolitan areas. In this paper, we present a selector method with the linear discriminant analysis (LDA) among different kinds of mobile location estimation technologies we had proposed in previous work in order to combine their merits, then provide a more accurate estimation for location services. We build up a three-level binary tree to classify these four algorithms. These three levels are named as Stat-Geo level, CG-nonCG level and CT-EPM level. And these success ratios of these three levels are 85.22%, 88.45% and 88.89% respectively. We have tested our selector method with real data taken in Hong Kong and it is proven that it outperforms other existing location estimation algorithms among different kinds of terrains.
移动位置估计或移动定位正在成为移动电话网络的一项重要业务。众所周知,GPS可以提供准确的位置估计,但GPS在纽约市中心等城市和香港等城市的表现并不好也是一个众所周知的事实。在此基础上提出了许多基于无线蜂窝网络的移动定位估计方法,以弥补在向城域移动用户提供定位服务时GPS信号丢失的问题。本文在前人提出的各种移动定位估计技术中,结合线性判别分析(LDA)提出了一种选择方法,以综合其优点,为移动定位服务提供更准确的估计。我们建立了一个三层二叉树来对这四种算法进行分类。这三个级别分别是Stat-Geo级别、CG-nonCG级别和CT-EPM级别。三个层次的成功率分别为85.22%、88.45%和88.89%。我们用香港的实际数据测试了我们的选择器方法,并证明它在不同类型的地形中优于其他现有的位置估计算法。
{"title":"A selector method for providing mobile location estimation services within a radio cellular network","authors":"Junyang Zhou, J. Ng","doi":"10.1109/ARES.2006.16","DOIUrl":"https://doi.org/10.1109/ARES.2006.16","url":null,"abstract":"Mobile location estimation or mobile positioning is becoming an important service for a mobile phone network. It is well-known that GPS can provide accurate location estimation, but it is also a known fact that GPS does not perform well in urban areas like downtown New York and cities like Hong Kong. Then many mobile location estimation approaches based on radio cellular networks have been proposed to compensate the problem of the lost of GPS signals in providing location services to mobile users in metropolitan areas. In this paper, we present a selector method with the linear discriminant analysis (LDA) among different kinds of mobile location estimation technologies we had proposed in previous work in order to combine their merits, then provide a more accurate estimation for location services. We build up a three-level binary tree to classify these four algorithms. These three levels are named as Stat-Geo level, CG-nonCG level and CT-EPM level. And these success ratios of these three levels are 85.22%, 88.45% and 88.89% respectively. We have tested our selector method with real data taken in Hong Kong and it is proven that it outperforms other existing location estimation algorithms among different kinds of terrains.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126377886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Identifying intrusions in computer networks with principal component analysis 用主成分分析法识别计算机网络入侵
Wei Wang, R. Battiti
Most current anomaly intrusion detection systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intrusion detection methods cannot process large amounts of audit data for real-time operation. In this paper, we propose a novel method for intrusion identification in computer networks based on principal component analysis (PCA). Each network connection is transformed into an input data vector. PCA is employed to reduce the dimensionality of the data vectors and identification is handled in a low dimensional space with high efficiency and low use of system resources. The normal behavior is profiled based on normal data for anomaly detection and models of each type of attack are built based on attack data for intrusion identification. The distance between a vector and its reconstruction onto those reduced subspaces representing the different types of attacks and normal activities is used for identification. The method is tested with network data from MIT Lincoln labs for the 1998 DARPA intrusion detection evaluation program and testing results show that the model is promising in terms of identification accuracy and computational efficiency for real-time intrusion identification.
目前大多数异常入侵检测系统(ids)只能检测计算机网络的正常或异常行为,但无法识别攻击的类型。而且,目前大多数入侵检测方法无法处理大量的审计数据,无法进行实时操作。本文提出了一种基于主成分分析(PCA)的计算机网络入侵识别方法。每个网络连接被转换成一个输入数据向量。采用主成分分析法对数据向量进行降维处理,在低维空间内进行识别,效率高,系统资源利用率低。基于正常数据对正常行为进行分析,用于异常检测;基于攻击数据建立各种攻击模型,用于入侵识别。向量与其重构到表示不同类型攻击和正常活动的约简子空间之间的距离用于识别。利用麻省理工学院林肯实验室1998年DARPA入侵检测评估项目的网络数据对该方法进行了测试,测试结果表明,该模型在识别精度和计算效率方面具有良好的实时入侵识别能力。
{"title":"Identifying intrusions in computer networks with principal component analysis","authors":"Wei Wang, R. Battiti","doi":"10.1109/ARES.2006.73","DOIUrl":"https://doi.org/10.1109/ARES.2006.73","url":null,"abstract":"Most current anomaly intrusion detection systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intrusion detection methods cannot process large amounts of audit data for real-time operation. In this paper, we propose a novel method for intrusion identification in computer networks based on principal component analysis (PCA). Each network connection is transformed into an input data vector. PCA is employed to reduce the dimensionality of the data vectors and identification is handled in a low dimensional space with high efficiency and low use of system resources. The normal behavior is profiled based on normal data for anomaly detection and models of each type of attack are built based on attack data for intrusion identification. The distance between a vector and its reconstruction onto those reduced subspaces representing the different types of attacks and normal activities is used for identification. The method is tested with network data from MIT Lincoln labs for the 1998 DARPA intrusion detection evaluation program and testing results show that the model is promising in terms of identification accuracy and computational efficiency for real-time intrusion identification.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129851725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 117
Improving security management through passive network observation 通过被动网络观察改进安全管理
Yohann Thomas, Hervé Debar, B. Morin
Detailed and reliable knowledge of the characteristics of an information system is becoming a very important feature for operational security. Unfortunately, vulnerability assessment tools have important side effects on the monitored information systems. In this paper, we propose an approach to gather or deduce information similar to vulnerability assessment reports, based on passive network observation. Information collected goes beyond classic server vulnerability assessment, enabling compliance verification of desktop clients.
详细而可靠地了解信息系统的特性正成为保证运行安全的一个非常重要的特征。不幸的是,脆弱性评估工具对被监测的信息系统有重要的副作用。本文提出了一种基于被动网络观察的类似于漏洞评估报告的信息收集或推断方法。收集的信息超越了传统的服务器漏洞评估,支持对桌面客户机进行遵从性验证。
{"title":"Improving security management through passive network observation","authors":"Yohann Thomas, Hervé Debar, B. Morin","doi":"10.1109/ARES.2006.74","DOIUrl":"https://doi.org/10.1109/ARES.2006.74","url":null,"abstract":"Detailed and reliable knowledge of the characteristics of an information system is becoming a very important feature for operational security. Unfortunately, vulnerability assessment tools have important side effects on the monitored information systems. In this paper, we propose an approach to gather or deduce information similar to vulnerability assessment reports, based on passive network observation. Information collected goes beyond classic server vulnerability assessment, enabling compliance verification of desktop clients.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129555425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Highly adaptable dynamic quorum schemes for managing replicated data 用于管理复制数据的高适应性动态仲裁方案
C. Storm, Oliver E. Theel
Dynamic data replication schemes perform superior compared to static schemes in terms of operation availabilities. However, most of them are bounded wrt. the replication degree, i.e. "classic" dynamics varies the degree in the range from one to n replicas not allowing to exceed this upper bound at run-time. In this paper, we present a new framework for adaptable dynamic replication schemes that is able to overcome this limitation by means of creating and deleting an arbitrary number of replicas at run-time. The new framework conceptually extends the dynamic general structured voting framework. The underlying concepts are presented and an example scenario is provided that compares the adaptable approach to the dynamic grid protocol via simulation. It is shown that adaptiveness increases operation availability while providing cost-efficiency.
动态数据复制模式在操作可用性方面优于静态模式。然而,它们中的大多数都是有界的。复制度,即。“经典”动态在1到n个副本的范围内变化程度,不允许在运行时超过这个上限。在本文中,我们为适应性动态复制方案提出了一个新的框架,该框架能够通过在运行时创建和删除任意数量的副本来克服这一限制。新框架在概念上扩展了动态的一般结构化投票框架。给出了基本概念,并通过仿真比较了自适应方法与动态网格协议的区别。结果表明,自适应在提供成本效益的同时提高了操作的可用性。
{"title":"Highly adaptable dynamic quorum schemes for managing replicated data","authors":"C. Storm, Oliver E. Theel","doi":"10.1109/ARES.2006.72","DOIUrl":"https://doi.org/10.1109/ARES.2006.72","url":null,"abstract":"Dynamic data replication schemes perform superior compared to static schemes in terms of operation availabilities. However, most of them are bounded wrt. the replication degree, i.e. \"classic\" dynamics varies the degree in the range from one to n replicas not allowing to exceed this upper bound at run-time. In this paper, we present a new framework for adaptable dynamic replication schemes that is able to overcome this limitation by means of creating and deleting an arbitrary number of replicas at run-time. The new framework conceptually extends the dynamic general structured voting framework. The underlying concepts are presented and an example scenario is provided that compares the adaptable approach to the dynamic grid protocol via simulation. It is shown that adaptiveness increases operation availability while providing cost-efficiency.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116047669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modeling dependable systems using hybrid Bayesian networks 基于混合贝叶斯网络的可靠系统建模
M. Neil, Manesh Tailor, N. Fenton, D. Marquez, P. Hearty
A hybrid Bayesian network (BN) is one that incorporates both discrete and continuous nodes. In our extensive applications of BNs for system dependability assessment the models are invariably hybrid and the need for efficient and accurate computation is paramount. We apply a new iterative algorithm that efficiently combines dynamic discretisation with robust propagation algorithms on junction tree structures to perform inference in hybrid BNs. We illustrate its use on two example dependability problems: reliability estimation and diagnosis of a faulty sensor in a temporal system. Dynamic discretisation can be used as an alternative to analytical or Monte Carlo methods with high precision and can be applied to a wide range of dependability problems.
混合贝叶斯网络(BN)是一个包含离散和连续节点的网络。在我们对系统可靠性评估的广泛应用中,模型总是混合的,对高效和准确计算的需求是至关重要的。我们采用一种新的迭代算法,该算法有效地将动态离散化与结点树结构上的鲁棒传播算法结合起来,对混合神经网络进行推理。我们在两个可靠性问题的例子中说明了它的应用:一个时间系统中故障传感器的可靠性估计和诊断。动态离散化可以作为分析方法或蒙特卡罗方法的一种替代方法,具有很高的精度,可以应用于广泛的可靠性问题。
{"title":"Modeling dependable systems using hybrid Bayesian networks","authors":"M. Neil, Manesh Tailor, N. Fenton, D. Marquez, P. Hearty","doi":"10.1109/ARES.2006.83","DOIUrl":"https://doi.org/10.1109/ARES.2006.83","url":null,"abstract":"A hybrid Bayesian network (BN) is one that incorporates both discrete and continuous nodes. In our extensive applications of BNs for system dependability assessment the models are invariably hybrid and the need for efficient and accurate computation is paramount. We apply a new iterative algorithm that efficiently combines dynamic discretisation with robust propagation algorithms on junction tree structures to perform inference in hybrid BNs. We illustrate its use on two example dependability problems: reliability estimation and diagnosis of a faulty sensor in a temporal system. Dynamic discretisation can be used as an alternative to analytical or Monte Carlo methods with high precision and can be applied to a wide range of dependability problems.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126901752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 84
Defense trees for economic evaluation of security investments 安全投资经济评价的防御树
Stefano Bistarelli, F. Fioravanti, Pamela Peretti
In this paper we present a mixed qualitative and quantitative approach for evaluation of information technology (IT) security investments. For this purpose, we model security scenarios by using defense trees, an extension of attack trees with attack countermeasures and we use economic quantitative indexes for computing the defender's return on security investment and the attacker's return on attack. We show how our approach can be used to evaluate effectiveness and economic profitability of countermeasures as well as their deterrent effect on attackers, thus providing decision makers with a useful tool for performing better evaluation of IT security investments during the risk management process.
在本文中,我们提出了一种混合定性和定量的方法来评估信息技术(IT)安全投资。为此,我们使用防御树(一种带有攻击对策的攻击树的扩展)对安全场景进行建模,并使用经济量化指标计算防御者的安全投资回报和攻击者的攻击回报。我们展示了如何使用我们的方法来评估对策的有效性和经济效益,以及它们对攻击者的威慑作用,从而为决策者提供了一个有用的工具,以便在风险管理过程中更好地评估IT安全投资。
{"title":"Defense trees for economic evaluation of security investments","authors":"Stefano Bistarelli, F. Fioravanti, Pamela Peretti","doi":"10.1109/ARES.2006.46","DOIUrl":"https://doi.org/10.1109/ARES.2006.46","url":null,"abstract":"In this paper we present a mixed qualitative and quantitative approach for evaluation of information technology (IT) security investments. For this purpose, we model security scenarios by using defense trees, an extension of attack trees with attack countermeasures and we use economic quantitative indexes for computing the defender's return on security investment and the attacker's return on attack. We show how our approach can be used to evaluate effectiveness and economic profitability of countermeasures as well as their deterrent effect on attackers, thus providing decision makers with a useful tool for performing better evaluation of IT security investments during the risk management process.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124198463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 173
Choosing the right wireless LAN security protocol for the home and business user 为家庭和企业用户选择正确的无线局域网安全协议
C. Maple, H. Jacobs, M. Reeve
The introduction and evolution of security standards for wireless networking has been a problematic process. Flaws in the initial security standard resulted in quick-fix solutions and interoperability issues. As wireless networks are not confined to a building, there is an added security risk that radio signals can be detected externally. Wireless networking has rapidly increased in popularity over the last few years due to the flexibility it provides. Given the simultaneous growth of e-government services there is particular risk to the citizen of identity theft. This article discusses the progression of wireless security protocols since their introduction and the effect this has had on home and business users. The risks of using wireless networks are outlined in the paper and recommendations for securing wireless networks are reviewed.
无线网络安全标准的引入和发展一直是一个充满问题的过程。最初安全标准中的缺陷导致了快速修复解决方案和互操作性问题。由于无线网络并不局限于建筑物,因此无线电信号可以从外部检测到,这是一个额外的安全风险。由于无线网络提供的灵活性,它在过去几年中迅速普及。鉴于电子政务服务的同步增长,公民身份被盗的风险特别大。本文讨论了无线安全协议自问世以来的发展及其对家庭和企业用户的影响。本文概述了使用无线网络的风险,并对保护无线网络的建议进行了综述。
{"title":"Choosing the right wireless LAN security protocol for the home and business user","authors":"C. Maple, H. Jacobs, M. Reeve","doi":"10.1109/ARES.2006.42","DOIUrl":"https://doi.org/10.1109/ARES.2006.42","url":null,"abstract":"The introduction and evolution of security standards for wireless networking has been a problematic process. Flaws in the initial security standard resulted in quick-fix solutions and interoperability issues. As wireless networks are not confined to a building, there is an added security risk that radio signals can be detected externally. Wireless networking has rapidly increased in popularity over the last few years due to the flexibility it provides. Given the simultaneous growth of e-government services there is particular risk to the citizen of identity theft. This article discusses the progression of wireless security protocols since their introduction and the effect this has had on home and business users. The risks of using wireless networks are outlined in the paper and recommendations for securing wireless networks are reviewed.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129071377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
First International Conference on Availability, Reliability and Security (ARES'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1