首页 > 最新文献

2017 12th Asia Joint Conference on Information Security (AsiaJCIS)最新文献

英文 中文
Based on Standard Descriptors and Dynamic Key Features to Detect Malicious USB Storage Devices in APT 基于标准描述符和动态密钥特征的APT恶意USB存储设备检测
Pub Date : 2017-08-01 DOI: 10.1109/AsiaJCIS.2017.22
Hung-Chang Chang
Advanced persistent threats (APTs) are a type of attack that critically threaten a number of corporations. With advances in information technology, attack methods have evolved from social engineering and e-mail methods to simulated human interface device attacks, which have remained undetectable by intrusion detection systems. Teensy was initially designed as a hardware device for legitimate applications, but because it enables the control of computers through a simulated keyboard or mouse-style pointing device, certain parties have utilized it as a malicious APT device to control computers for illegitimate uses. This study proposed a method based on the characteristics of Universal Serial Bus (USB) standard descriptors and dynamic key characteristics to detect malicious USB devices. This method is capable of successfully detecting malicious USB devices and defending against malicious USB attacks.
高级持续性威胁(apt)是一种严重威胁许多公司的攻击类型。随着信息技术的进步,攻击方法已经从社会工程和电子邮件方法发展到模拟人机界面设备攻击,这些攻击仍然无法被入侵检测系统检测到。Teensy最初被设计为合法应用程序的硬件设备,但由于它可以通过模拟键盘或鼠标式的指向设备来控制计算机,因此某些人将其用作恶意APT设备来控制计算机进行非法使用。本文提出了一种基于USB标准描述符特征和动态密钥特征的恶意USB设备检测方法。该方法能够成功检测出恶意USB设备,防御恶意USB攻击。
{"title":"Based on Standard Descriptors and Dynamic Key Features to Detect Malicious USB Storage Devices in APT","authors":"Hung-Chang Chang","doi":"10.1109/AsiaJCIS.2017.22","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2017.22","url":null,"abstract":"Advanced persistent threats (APTs) are a type of attack that critically threaten a number of corporations. With advances in information technology, attack methods have evolved from social engineering and e-mail methods to simulated human interface device attacks, which have remained undetectable by intrusion detection systems. Teensy was initially designed as a hardware device for legitimate applications, but because it enables the control of computers through a simulated keyboard or mouse-style pointing device, certain parties have utilized it as a malicious APT device to control computers for illegitimate uses. This study proposed a method based on the characteristics of Universal Serial Bus (USB) standard descriptors and dynamic key characteristics to detect malicious USB devices. This method is capable of successfully detecting malicious USB devices and defending against malicious USB attacks.","PeriodicalId":108636,"journal":{"name":"2017 12th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124787500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UnPhishMe: Phishing Attack Detection by Deceptive Login Simulation through an Android Mobile App UnPhishMe:基于Android移动应用欺骗登录模拟的网络钓鱼攻击检测
Pub Date : 2017-08-01 DOI: 10.1109/AsiaJCIS.2017.19
J. D. Ndibwile, Y. Kadobayashi, Doudou Fall
Phishing attacks have been increasing recently. Attackers use clever social engineering techniques to convince their victims into clicking a malware or deceptive login-based webpages. Most solutions for this particular problem focus more on helping desktop computer users than mobile device users. Mobile device users are more vulnerable than their desktop counterparts because they are online most of the time and they have device limitations such as smaller screen size and low computational power. This paper presents UnPhishMe, an effective mobile application prototype that takes advantage of a particular weakness of phishing sites: they accept any kind of input information for authentication. UnPhishMe enables a mobile device user to create fake login account, with fake login credentials, that mimics user login procedure every time the user opens a login webpage and generates an alert to her. UnPhishMe determines whether the current login page shifts to another webpage after an authentication attempt. It does so by monitoring hashcode changes of the URL when the page is loading, listens to HttpURLConnection status code, and then makes a decision on whether the website is fraudulent or not. We measured the effectiveness of UnPhishMe by conducting a user experiment on android platforms and tested its detection accuracy, memory and CPU performance. The results show that UnPhishMe uses a very small amount of computational power and it is effective in assisting users to identify phishing attacks with an accuracy of 96%.
网络钓鱼攻击最近一直在增加。攻击者使用聪明的社会工程技术来说服受害者点击恶意软件或欺骗性的基于登录的网页。针对这个特定问题的大多数解决方案更多地关注于帮助桌面计算机用户,而不是移动设备用户。移动设备用户比桌面设备用户更容易受到攻击,因为他们大部分时间都在线,而且他们有设备限制,比如屏幕尺寸较小,计算能力较低。本文介绍了UnPhishMe,一个有效的移动应用程序原型,它利用了网络钓鱼网站的一个特殊弱点:它们接受任何类型的输入信息进行身份验证。UnPhishMe允许移动设备用户使用虚假的登录凭据创建虚假的登录帐户,每次用户打开登录网页时,都会模仿用户的登录过程,并向她发出警告。UnPhishMe判断当前登录页面在尝试身份验证后是否会转移到其他页面。它通过在页面加载时监视URL的哈希码变化,监听HttpURLConnection状态码,然后决定该网站是否具有欺诈性来实现这一点。我们通过在android平台上进行用户实验来衡量UnPhishMe的有效性,并测试其检测准确率、内存和CPU性能。结果表明,UnPhishMe使用的计算能力非常小,可以有效地帮助用户识别网络钓鱼攻击,准确率达到96%。
{"title":"UnPhishMe: Phishing Attack Detection by Deceptive Login Simulation through an Android Mobile App","authors":"J. D. Ndibwile, Y. Kadobayashi, Doudou Fall","doi":"10.1109/AsiaJCIS.2017.19","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2017.19","url":null,"abstract":"Phishing attacks have been increasing recently. Attackers use clever social engineering techniques to convince their victims into clicking a malware or deceptive login-based webpages. Most solutions for this particular problem focus more on helping desktop computer users than mobile device users. Mobile device users are more vulnerable than their desktop counterparts because they are online most of the time and they have device limitations such as smaller screen size and low computational power. This paper presents UnPhishMe, an effective mobile application prototype that takes advantage of a particular weakness of phishing sites: they accept any kind of input information for authentication. UnPhishMe enables a mobile device user to create fake login account, with fake login credentials, that mimics user login procedure every time the user opens a login webpage and generates an alert to her. UnPhishMe determines whether the current login page shifts to another webpage after an authentication attempt. It does so by monitoring hashcode changes of the URL when the page is loading, listens to HttpURLConnection status code, and then makes a decision on whether the website is fraudulent or not. We measured the effectiveness of UnPhishMe by conducting a user experiment on android platforms and tested its detection accuracy, memory and CPU performance. The results show that UnPhishMe uses a very small amount of computational power and it is effective in assisting users to identify phishing attacks with an accuracy of 96%.","PeriodicalId":108636,"journal":{"name":"2017 12th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133707556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An Improved Model of Anomaly Detection Using Two-Level Classifier Ensemble 一种改进的两级分类器集成异常检测模型
Pub Date : 2017-08-01 DOI: 10.1109/AsiaJCIS.2017.9
Bayu Adhi Tama, A. Patil, K. Rhee
Network infrastructures are in jeopardy of suffering nowadays since a number of attacks have been developed and grown up enormously. In order to get rid of such security threats, a defense mechanism is much sought-after. This paper proposes an improved model of intrusion detection by using two-level classifier ensemble. The proposed model is made up of a PSO-based feature selection technique and a two-level classifier ensemble which employs two ensemble learners, i.e. boosting and random subspace model (RSM). The experiment conducted on NSL-KDD dataset reveals that the proposed model outperforms previous detection models significantly in terms of accuracy and false alarm rate (FPR).
随着各种攻击的发展和壮大,网络基础设施面临着严重的威胁。为了消除这些安全威胁,一种防御机制是非常需要的。本文提出了一种改进的两级分类器集成入侵检测模型。该模型由基于pso的特征选择技术和采用boosting和随机子空间模型(RSM)两种集成学习器的两级分类器集成组成。在NSL-KDD数据集上进行的实验表明,该模型在准确率和虚警率(FPR)方面明显优于以往的检测模型。
{"title":"An Improved Model of Anomaly Detection Using Two-Level Classifier Ensemble","authors":"Bayu Adhi Tama, A. Patil, K. Rhee","doi":"10.1109/AsiaJCIS.2017.9","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2017.9","url":null,"abstract":"Network infrastructures are in jeopardy of suffering nowadays since a number of attacks have been developed and grown up enormously. In order to get rid of such security threats, a defense mechanism is much sought-after. This paper proposes an improved model of intrusion detection by using two-level classifier ensemble. The proposed model is made up of a PSO-based feature selection technique and a two-level classifier ensemble which employs two ensemble learners, i.e. boosting and random subspace model (RSM). The experiment conducted on NSL-KDD dataset reveals that the proposed model outperforms previous detection models significantly in terms of accuracy and false alarm rate (FPR).","PeriodicalId":108636,"journal":{"name":"2017 12th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127081830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Improvement of Privacy Preserved Rule-Based Risk Analysis via Secure Multi-Party Computation 基于安全多方计算的隐私保护规则风险分析改进
Pub Date : 2017-08-01 DOI: 10.1109/AsiaJCIS.2017.18
Soushirou Sakumoto, Akira Kanaoka
Currently, when companies conduct risk analysis of own networks and systems, it is common to outsource risk analysis to third-party experts. At that time, the company passes the information used for risk analysis including confidential information such as network configuration to third-party expert. It raises the risk of leakage and abuse of confidential information. Therefore, a method of risk analysis by using secure computation without passing confidential information of company has been proposed. Although Liu's method have firstly achieved secure risk analysis method using multiparty computation and attack tree analysis, it has several problems to be practical. In this paper, improvement of secure risk analysis method is proposed. It can dynamically reduce compilation time, enhance scale of target network and system without increasing execution time. Experimental work is carried out by prototype implementation. As a result, we achieved improved performance in compile time and enhance scale of target with equivalent performance on execution time.
目前,企业在对自己的网络和系统进行风险分析时,通常会将风险分析外包给第三方专家。此时,公司将用于风险分析的信息,包括网络配置等机密信息,转交给第三方专家。这增加了泄露和滥用机密信息的风险。因此,本文提出了一种不传递公司机密信息的安全计算风险分析方法。Liu的方法虽然首次实现了使用多方计算和攻击树分析的安全风险分析方法,但在实际应用中存在一些问题。本文对安全风险分析方法进行了改进。它可以在不增加执行时间的情况下动态减少编译时间,提高目标网络和系统的规模。实验工作通过样机实现进行。因此,我们在编译时获得了改进的性能,并在执行时获得了相同的性能,从而增强了目标的规模。
{"title":"Improvement of Privacy Preserved Rule-Based Risk Analysis via Secure Multi-Party Computation","authors":"Soushirou Sakumoto, Akira Kanaoka","doi":"10.1109/AsiaJCIS.2017.18","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2017.18","url":null,"abstract":"Currently, when companies conduct risk analysis of own networks and systems, it is common to outsource risk analysis to third-party experts. At that time, the company passes the information used for risk analysis including confidential information such as network configuration to third-party expert. It raises the risk of leakage and abuse of confidential information. Therefore, a method of risk analysis by using secure computation without passing confidential information of company has been proposed. Although Liu's method have firstly achieved secure risk analysis method using multiparty computation and attack tree analysis, it has several problems to be practical. In this paper, improvement of secure risk analysis method is proposed. It can dynamically reduce compilation time, enhance scale of target network and system without increasing execution time. Experimental work is carried out by prototype implementation. As a result, we achieved improved performance in compile time and enhance scale of target with equivalent performance on execution time.","PeriodicalId":108636,"journal":{"name":"2017 12th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"60 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114009872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lightweight Malware Classification Method Based on Detection Results of Anti-Virus Software 基于杀毒软件检测结果的轻量级恶意软件分类方法
Pub Date : 2017-08-01 DOI: 10.1109/AsiaJCIS.2017.20
Younsu Lee, Sang-So Choi, Jangwon Choi, Jungsuk Song
With the development of cyber threats on the Internet, the number of malware, especially unknown malware, is also dramatically increasing. Since all of malware cannot be analyzed by analysts, it is very important to find out new malware that should be analyzed by them. In order to cope with this issue, the existing approaches focused on malware classification using static or dynamic analysis results of malware. However, the static and the dynamic analyses themselves are also too costly and not easy to build the isolated, secure and Internet-like analysis environments such as sandbox. In this paper, we propose a lightweight malware classification method based on detection results of anti-virus software. Since the proposed method can reduce the volume of malware that should be analyzed by analysts, it can be used as a preprocess for in-depth analysis of malware. The experimental showed that the proposed method succeeded in classification of 1,000 malware samples into 187 unique groups. This means that 81% of the original malware samples do not need to analyze by analysts.
随着网络威胁的不断发展,恶意软件尤其是未知恶意软件的数量也在急剧增加。由于分析人员无法分析所有的恶意软件,因此发现需要分析的新恶意软件非常重要。为了解决这一问题,现有的方法主要是利用恶意软件的静态或动态分析结果对恶意软件进行分类。然而,静态和动态分析本身也过于昂贵,并且不容易构建隔离的、安全的和类似internet的分析环境,如沙箱。本文提出了一种基于杀毒软件检测结果的轻量级恶意软件分类方法。由于该方法可以减少分析人员需要分析的恶意软件数量,因此可以作为深入分析恶意软件的预处理。实验表明,该方法成功地将1000个恶意软件样本分类为187个不同的组。这意味着81%的原始恶意软件样本不需要分析人员进行分析。
{"title":"A Lightweight Malware Classification Method Based on Detection Results of Anti-Virus Software","authors":"Younsu Lee, Sang-So Choi, Jangwon Choi, Jungsuk Song","doi":"10.1109/AsiaJCIS.2017.20","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2017.20","url":null,"abstract":"With the development of cyber threats on the Internet, the number of malware, especially unknown malware, is also dramatically increasing. Since all of malware cannot be analyzed by analysts, it is very important to find out new malware that should be analyzed by them. In order to cope with this issue, the existing approaches focused on malware classification using static or dynamic analysis results of malware. However, the static and the dynamic analyses themselves are also too costly and not easy to build the isolated, secure and Internet-like analysis environments such as sandbox. In this paper, we propose a lightweight malware classification method based on detection results of anti-virus software. Since the proposed method can reduce the volume of malware that should be analyzed by analysts, it can be used as a preprocess for in-depth analysis of malware. The experimental showed that the proposed method succeeded in classification of 1,000 malware samples into 187 unique groups. This means that 81% of the original malware samples do not need to analyze by analysts.","PeriodicalId":108636,"journal":{"name":"2017 12th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115580679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identifying Threat Patterns of Android Applications 识别Android应用程序的威胁模式
Pub Date : 2017-08-01 DOI: 10.1109/AsiaJCIS.2017.23
Chia-Mei Chen, G. Lai, Je-Ming Lin
Mobile devices have become powerful and popular. Most internet applications or services are ported to mobile platforms. Confidential personal information such as credit card and password usually is stored in mobile devices for ubiquitous computing. Therefore, mobile devices become attack target due to financial gain. Mobile applications are published in various market places without or with little verification; hence malicious mobile applications can be deployed in the marketplaces without any difficulty.In this paper, we present a mobile malware detection approach by identifying the threat patterns. The proposed system analyzes the function invocation and the data flow to identify malicious behaviors in Android mobile devices. The experimental results show that the proposed method can efficiently detect malicious mobile applications including unknown malware.
移动设备已经变得强大和流行。大多数互联网应用程序或服务都移植到了移动平台上。信用卡和密码等个人机密信息通常存储在移动设备中,用于普惠计算。因此,由于经济利益,移动设备成为攻击的目标。移动应用程序在各种市场上发布,没有或很少经过验证;因此,恶意移动应用程序可以毫无困难地部署在市场上。在本文中,我们提出了一种通过识别威胁模式的移动恶意软件检测方法。该系统通过分析函数调用和数据流来识别Android移动设备中的恶意行为。实验结果表明,该方法可以有效地检测出包括未知恶意软件在内的恶意移动应用。
{"title":"Identifying Threat Patterns of Android Applications","authors":"Chia-Mei Chen, G. Lai, Je-Ming Lin","doi":"10.1109/AsiaJCIS.2017.23","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2017.23","url":null,"abstract":"Mobile devices have become powerful and popular. Most internet applications or services are ported to mobile platforms. Confidential personal information such as credit card and password usually is stored in mobile devices for ubiquitous computing. Therefore, mobile devices become attack target due to financial gain. Mobile applications are published in various market places without or with little verification; hence malicious mobile applications can be deployed in the marketplaces without any difficulty.In this paper, we present a mobile malware detection approach by identifying the threat patterns. The proposed system analyzes the function invocation and the data flow to identify malicious behaviors in Android mobile devices. The experimental results show that the proposed method can efficiently detect malicious mobile applications including unknown malware.","PeriodicalId":108636,"journal":{"name":"2017 12th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122184385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance Analysis of Some Batch Verification Methods of Digital Signatures 几种数字签名批量验证方法的性能分析
Pub Date : 2017-08-01 DOI: 10.1109/AsiaJCIS.2017.14
D. Guan, E. Zhuang, I. C. Chung, Yu-Shen Lin
In this paper, we compare three methods in detecting invalid signatures in batch verification. The first method, randomly select test, randomly chooses a half of signatures to verify in a batch. The second method is the small exponent test which is widely used. The third method, randomly numbering test, is a simplified method of the matrix-detection algorithm. The randomly numbering test randomizes the order of the signatures and verifies the signatures in log k+1 batches where k is the number of signatures. We simulate each method and analyze the efficiency of the methods. As a result, randomly numbering test is more efficient than small exponent test when the number of signatures in a batch verification is large.
本文比较了批验证中检测无效签名的三种方法。第一种方法是随机选择测试,随机选择一半的签名进行批量验证。第二种方法是广泛使用的小指数检验。第三种方法是随机编号检验,它是矩阵检测算法的一种简化方法。随机编号测试将签名的顺序随机化,以log k+1批(k为签名个数)为周期进行验证。对每种方法进行了仿真,并对其有效性进行了分析。因此,当批量验证的签名数较大时,随机编号测试比小指数测试效率更高。
{"title":"Performance Analysis of Some Batch Verification Methods of Digital Signatures","authors":"D. Guan, E. Zhuang, I. C. Chung, Yu-Shen Lin","doi":"10.1109/AsiaJCIS.2017.14","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2017.14","url":null,"abstract":"In this paper, we compare three methods in detecting invalid signatures in batch verification. The first method, randomly select test, randomly chooses a half of signatures to verify in a batch. The second method is the small exponent test which is widely used. The third method, randomly numbering test, is a simplified method of the matrix-detection algorithm. The randomly numbering test randomizes the order of the signatures and verifies the signatures in log k+1 batches where k is the number of signatures. We simulate each method and analyze the efficiency of the methods. As a result, randomly numbering test is more efficient than small exponent test when the number of signatures in a batch verification is large.","PeriodicalId":108636,"journal":{"name":"2017 12th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129662683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Practical Experiment of the HTTP-Based RAT Detection Method in Proxy Server Logs 基于http的代理服务器日志RAT检测方法的实验研究
Pub Date : 2017-08-01 DOI: 10.1109/AsiaJCIS.2017.13
M. Mimura, Yuhei Otsubo, Hidehiko Tanaka, Hidema Tanaka
Detecting RAT (Remote Access Trojan or Remote Administration Tool) used in APT (Advanced Persistent Threat) attacks is a challenging task. Many previous methods to detect RATs on the network require monitoring all network traffic. However, it is difficult to keep all network traffic because the size is too huge. Actually, we would have to detect RAT activity through insufficient information such as proxy server logs. Therefore, we proposed how to detect RAT activity in proxy server logs. Our method uses only the behavior and does not use pattern matching. While the behavior is not defined by character strings or regular expressions, is defined by network traffic patterns such as the sizes of the object returned to the client or the intervals of the logged time. The classification performance in general condition is good. However, the performance in practical condition is not certain. In practical condition, we have to choose arbitrary training data. In this paper, we apply this method to actual proxy server logs in practical condition, and show that this method can detect more than 95 percent of malicious communications with few false positives in APT attacks. This method does not require monitoring all network traffic, uses only standard proxy server logs. Moreover, this method can also detect http based RATs in real time.
检测用于APT(高级持续威胁)攻击的RAT(远程访问木马或远程管理工具)是一项具有挑战性的任务。以前很多检测网络中的rat的方法都需要监控所有的网络流量。然而,由于规模太大,很难保持所有的网络流量。实际上,我们必须通过不充分的信息(如代理服务器日志)来检测RAT活动。因此,我们提出了如何检测代理服务器日志中的RAT活动。我们的方法只使用行为而不使用模式匹配。虽然行为不是由字符串或正则表达式定义的,但它是由网络流量模式定义的,例如返回到客户端的对象的大小或记录时间的间隔。在一般情况下分类性能良好。然而,在实际条件下的性能并不确定。在实际情况下,我们不得不选择任意的训练数据。在本文中,我们将该方法应用于实际情况下的实际代理服务器日志,并表明该方法在APT攻击中可以检测出95%以上的恶意通信,并且几乎没有误报。这种方法不需要监视所有的网络流量,只使用标准的代理服务器日志。此外,该方法还可以实时检测基于http的rat。
{"title":"A Practical Experiment of the HTTP-Based RAT Detection Method in Proxy Server Logs","authors":"M. Mimura, Yuhei Otsubo, Hidehiko Tanaka, Hidema Tanaka","doi":"10.1109/AsiaJCIS.2017.13","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2017.13","url":null,"abstract":"Detecting RAT (Remote Access Trojan or Remote Administration Tool) used in APT (Advanced Persistent Threat) attacks is a challenging task. Many previous methods to detect RATs on the network require monitoring all network traffic. However, it is difficult to keep all network traffic because the size is too huge. Actually, we would have to detect RAT activity through insufficient information such as proxy server logs. Therefore, we proposed how to detect RAT activity in proxy server logs. Our method uses only the behavior and does not use pattern matching. While the behavior is not defined by character strings or regular expressions, is defined by network traffic patterns such as the sizes of the object returned to the client or the intervals of the logged time. The classification performance in general condition is good. However, the performance in practical condition is not certain. In practical condition, we have to choose arbitrary training data. In this paper, we apply this method to actual proxy server logs in practical condition, and show that this method can detect more than 95 percent of malicious communications with few false positives in APT attacks. This method does not require monitoring all network traffic, uses only standard proxy server logs. Moreover, this method can also detect http based RATs in real time.","PeriodicalId":108636,"journal":{"name":"2017 12th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121231502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Simulation Study of BGP Origin Validation Effect against Mis-Origination with Internet Topology Internet拓扑下防止错误发起的BGP起源验证效果仿真研究
Pub Date : 2017-08-01 DOI: 10.1109/AsiaJCIS.2017.17
Masahito Ando, Masayuki Okada, Akira Kanaoka
The current Border Gateway Protocol (BGP) operation in the Internet has a serious problem with regard to Mis-Origination, which is the hijacking or misconfiguration of network prefixes. We already have several Origin Validation (OV) techniques to mitigate the impact of Mis-Origination. an Internet Routing Registry (IRR) has been deployed only for a small number of users. More recently, RPKI (Resource Public Key Infrastructure) has come to be considered as the reality of the OV However, quantitative and large-scale simulation studies of its effect are not discussed deeply. In this paper, a quantitative simulation method of the OV effect for BGP is proposed. OV's impact on the entire Internet is measured in detail. Our results indicate that 1.56% of the top-ranked ASes can protect 98.70% of the ASes from Mis-Origination.
当前Internet上的BGP (Border Gateway Protocol,边界网关协议)操作存在一个严重的错误发起问题,即劫持或错误配置网络前缀。我们已经有了几种起源验证(OV)技术来减轻错误起源的影响。仅为少数用户部署了Internet路由注册(IRR)。最近,RPKI(资源公钥基础设施)已经被认为是OV的现实,然而,对其影响的定量和大规模模拟研究并没有深入讨论。本文提出了一种针对BGP的OV效应的定量仿真方法。OV对整个互联网的影响是详细衡量的。结果表明,1.56%的前位ase可以保护98.70%的ase免于误源。
{"title":"Simulation Study of BGP Origin Validation Effect against Mis-Origination with Internet Topology","authors":"Masahito Ando, Masayuki Okada, Akira Kanaoka","doi":"10.1109/AsiaJCIS.2017.17","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2017.17","url":null,"abstract":"The current Border Gateway Protocol (BGP) operation in the Internet has a serious problem with regard to Mis-Origination, which is the hijacking or misconfiguration of network prefixes. We already have several Origin Validation (OV) techniques to mitigate the impact of Mis-Origination. an Internet Routing Registry (IRR) has been deployed only for a small number of users. More recently, RPKI (Resource Public Key Infrastructure) has come to be considered as the reality of the OV However, quantitative and large-scale simulation studies of its effect are not discussed deeply. In this paper, a quantitative simulation method of the OV effect for BGP is proposed. OV's impact on the entire Internet is measured in detail. Our results indicate that 1.56% of the top-ranked ASes can protect 98.70% of the ASes from Mis-Origination.","PeriodicalId":108636,"journal":{"name":"2017 12th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116049670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Efficient Dispersal Storage Scheme Based on Ring-LWE and NTT 基于环形lwe和NTT的高效分散存储方案
Pub Date : 2017-08-01 DOI: 10.1109/AsiaJCIS.2017.12
Ling Yang, Xianhui Lu
We propose a novel dispersal storage scheme based on the ring learning with errors (Ring-LWE) problem. Our main technical contribution is a new systematic erasure code, called SNTT, to solve the problem of applying Ring-LWE in dispersal storage. SNTT is based on the number theoretic transform (NTT). To the best of our knowledge, SNTT is the first work that applies NTT to guarantee data availability. Analysis and experiments show that our new scheme with proper configurations outperforms the state of the art in encoding/decoding speed. Furthermore, we show that SNTT can also be used to optimize performance of existing schemes.
提出了一种新的基于带误差环学习(ring - lwe)问题的分散存储方案。我们的主要技术贡献是一个新的系统擦除码,称为SNTT,解决了在分散存储中应用Ring-LWE的问题。SNTT基于数论变换(NTT)。据我们所知,SNTT是第一个应用NTT来保证数据可用性的工作。分析和实验表明,在适当的配置下,我们的新方案在编解码速度上优于目前的技术水平。此外,我们还证明了SNTT也可以用于优化现有方案的性能。
{"title":"An Efficient Dispersal Storage Scheme Based on Ring-LWE and NTT","authors":"Ling Yang, Xianhui Lu","doi":"10.1109/AsiaJCIS.2017.12","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2017.12","url":null,"abstract":"We propose a novel dispersal storage scheme based on the ring learning with errors (Ring-LWE) problem. Our main technical contribution is a new systematic erasure code, called SNTT, to solve the problem of applying Ring-LWE in dispersal storage. SNTT is based on the number theoretic transform (NTT). To the best of our knowledge, SNTT is the first work that applies NTT to guarantee data availability. Analysis and experiments show that our new scheme with proper configurations outperforms the state of the art in encoding/decoding speed. Furthermore, we show that SNTT can also be used to optimize performance of existing schemes.","PeriodicalId":108636,"journal":{"name":"2017 12th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"351 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116533986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2017 12th Asia Joint Conference on Information Security (AsiaJCIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1