首页 > 最新文献

Proceedings of the 2022 International Conference on Cyber Security最新文献

英文 中文
Intelligent Penetration Testing in Dynamic Defense Environment 动态防御环境下的智能渗透测试
Pub Date : 2022-12-16 DOI: 10.1145/3584714.3584716
Qian Yao, Yongjie Wang, Xinli Xiong, Yang Li
Intelligent penetration testing (PT) becomes a hotspot. However, the existing intelligent PT environment is static and determined, which does not fully consider the impact of dynamic defense. To improve the fidelity of the existing simulation environment, in this paper, we conduct intelligent PT in a dynamic defense environment based on reinforcement learning (RL). First, the simulation details of intelligent PT in a dynamic defense environment are introduced. Second, we incorporate dynamic defense to the nodes of the network topology. Then we evaluate our proposed method by using the Chain scenario of CyberbattleSim with and without dynamic defense. We also conduct the environment in a larger-scale network scenario. And we analyze the efficiency of different parameters of the RL algorithm. The experimental results show that the average cumulative rewards have decreased obviously in a dynamic defense environment. As the number of nodes increases, it becomes more difficult for an agent to converge in this case. Additionally, it's recommended that an agent adopts a compromise of exploration and exploitation when observing a dynamic environment.
智能渗透测试(PT)成为研究的热点。但是,现有的智能PT环境是静态的、确定的,没有充分考虑动态防御的影响。为了提高现有仿真环境的逼真度,本文在基于强化学习(RL)的动态防御环境中进行智能PT。首先,介绍了智能PT在动态防御环境下的仿真细节。其次,我们将动态防御纳入到网络拓扑的节点中。然后,通过有和没有动态防御的网络战链场景,对所提出的方法进行了评估。我们还在更大规模的网络场景中进行环境测试。并分析了RL算法中不同参数的效率。实验结果表明,在动态防御环境下,平均累积奖励明显减少。随着节点数量的增加,代理在这种情况下收敛变得更加困难。此外,建议代理在观察动态环境时折衷探索和利用。
{"title":"Intelligent Penetration Testing in Dynamic Defense Environment","authors":"Qian Yao, Yongjie Wang, Xinli Xiong, Yang Li","doi":"10.1145/3584714.3584716","DOIUrl":"https://doi.org/10.1145/3584714.3584716","url":null,"abstract":"Intelligent penetration testing (PT) becomes a hotspot. However, the existing intelligent PT environment is static and determined, which does not fully consider the impact of dynamic defense. To improve the fidelity of the existing simulation environment, in this paper, we conduct intelligent PT in a dynamic defense environment based on reinforcement learning (RL). First, the simulation details of intelligent PT in a dynamic defense environment are introduced. Second, we incorporate dynamic defense to the nodes of the network topology. Then we evaluate our proposed method by using the Chain scenario of CyberbattleSim with and without dynamic defense. We also conduct the environment in a larger-scale network scenario. And we analyze the efficiency of different parameters of the RL algorithm. The experimental results show that the average cumulative rewards have decreased obviously in a dynamic defense environment. As the number of nodes increases, it becomes more difficult for an agent to converge in this case. Additionally, it's recommended that an agent adopts a compromise of exploration and exploitation when observing a dynamic environment.","PeriodicalId":112952,"journal":{"name":"Proceedings of the 2022 International Conference on Cyber Security","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126956751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pruned-F1DCN: A lightweight network model for traffic classification Pruned-F1DCN:一种轻量级的流量分类网络模型
Pub Date : 2022-12-16 DOI: 10.1145/3584714.3584719
Ruo nan Wang, Jin long Fei, Rong kai Zhang
With the continuous development of deep learning, deep neural networks are gradually applied to traffic classification problems. However, the large network structure and parameter number of deep neural networks hinder the application on edge computing devices. Reducing network scale helps relieve computational pressure, this paper proposes a lightweight traffic classification model to provide reliable accuracy and reduce the consumption of computing resources. In this work, we design an F1DCN network, which takes full advantage of the convolution layer parameters and the convolution kernel field of view. The lightweight approach effectively improves the classification performance and saves massive parameters. The model pruning method is applied to find the optimal structure of the network. Experiments on two public datasets show that the proposed model reduce more than 80 % parameters and 45 % FLOPS compared with traditional traffic classification methods, and maintaining more than 95 % classification accuracy.
随着深度学习的不断发展,深度神经网络逐渐被应用到流量分类问题中。然而,深度神经网络庞大的网络结构和参数数量阻碍了其在边缘计算设备上的应用。减小网络规模有助于减轻计算压力,本文提出了一种轻量级的流量分类模型,以提供可靠的准确率并减少计算资源的消耗。在这项工作中,我们设计了一个充分利用卷积层参数和卷积核视场的F1DCN网络。轻量级方法有效地提高了分类性能,节省了大量参数。采用模型剪枝法寻找网络的最优结构。在两个公开数据集上的实验表明,与传统的流量分类方法相比,该模型减少了80%以上的参数,减少了45%的FLOPS,保持了95%以上的分类准确率。
{"title":"Pruned-F1DCN: A lightweight network model for traffic classification","authors":"Ruo nan Wang, Jin long Fei, Rong kai Zhang","doi":"10.1145/3584714.3584719","DOIUrl":"https://doi.org/10.1145/3584714.3584719","url":null,"abstract":"With the continuous development of deep learning, deep neural networks are gradually applied to traffic classification problems. However, the large network structure and parameter number of deep neural networks hinder the application on edge computing devices. Reducing network scale helps relieve computational pressure, this paper proposes a lightweight traffic classification model to provide reliable accuracy and reduce the consumption of computing resources. In this work, we design an F1DCN network, which takes full advantage of the convolution layer parameters and the convolution kernel field of view. The lightweight approach effectively improves the classification performance and saves massive parameters. The model pruning method is applied to find the optimal structure of the network. Experiments on two public datasets show that the proposed model reduce more than 80 % parameters and 45 % FLOPS compared with traditional traffic classification methods, and maintaining more than 95 % classification accuracy.","PeriodicalId":112952,"journal":{"name":"Proceedings of the 2022 International Conference on Cyber Security","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127982087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of static taint analysis in RASP protection strategy 静态污染分析在RASP保护策略中的应用
Pub Date : 2022-12-16 DOI: 10.1145/3584714.3584723
Miao Ji, Ming Yin, Ying Hui Zhou
Program analysis plays an important role in ensuring the safety and correctness of Programs. Based on the cloud native security system and from the perspective of building a secure runtime application, this paper introduces the key technologies and algorithms in runtime application self-protection (RASP), puts forward a protection strategy scheme that creatively combines static taint analysis and RASP, and discusses the application of the scheme in the process of DevSecOps. Finally, the feasibility of the scheme is summarized through an example. Through the combination of program analysis technology and preset protection strategy, it provides a reference for the implementation of runtime application security protection.
程序分析在保证程序的安全性和正确性方面起着重要的作用。基于云原生安全系统,从构建安全运行时应用的角度,介绍了运行时应用自我保护(RASP)中的关键技术和算法,提出了一种创造性地将静态污染分析与RASP相结合的保护策略方案,并讨论了该方案在DevSecOps过程中的应用。最后,通过实例对方案的可行性进行了总结。通过程序分析技术与预置保护策略的结合,为运行时应用安全保护的实施提供参考。
{"title":"Application of static taint analysis in RASP protection strategy","authors":"Miao Ji, Ming Yin, Ying Hui Zhou","doi":"10.1145/3584714.3584723","DOIUrl":"https://doi.org/10.1145/3584714.3584723","url":null,"abstract":"Program analysis plays an important role in ensuring the safety and correctness of Programs. Based on the cloud native security system and from the perspective of building a secure runtime application, this paper introduces the key technologies and algorithms in runtime application self-protection (RASP), puts forward a protection strategy scheme that creatively combines static taint analysis and RASP, and discusses the application of the scheme in the process of DevSecOps. Finally, the feasibility of the scheme is summarized through an example. Through the combination of program analysis technology and preset protection strategy, it provides a reference for the implementation of runtime application security protection.","PeriodicalId":112952,"journal":{"name":"Proceedings of the 2022 International Conference on Cyber Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121422812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Moving-Target Defense for Detecting Coordinated Cyber-Physical Attacks in Power Grids via a Modified Sensor Measurements Expression 基于改进传感器测量表达式的电网网络物理协同攻击移动目标防御
Pub Date : 2022-12-16 DOI: 10.1145/3584714.3589127
Yu Jian
This paper proposes a modified sensor measurement expression for moving target defense (MTD) method to detect coordinated cyber-physical attacks(CCPAs). As a new type of attack, CCPAs are considerably harmful. Through elaborately designing a coordinated cyber-attack, the negative effects of a physical attack on sensor measurements are masked and can bypass bad data detector(BDD). MTD strategy can actively perturb transmission lines’ reactances, which makes the knowledge of a power grid grasped by attackers invalid. In the paper, first, based on undetectable CCPAs production principle before MTD activation, the undetectable CCPAs’ production mechanism is analyzed after MTD activation; and then a modified sensor measurement expression for detecting CCPAs is provided after MTD activation. Extensive simulations implemented on IEEE 14-bus, IEEE 30-bus and IEEE 118-bus systems verify the simplicity and efficiency of the approach.
提出了一种改进的传感器测量表达式,用于移动目标防御(MTD)方法检测协同网络物理攻击(ccpa)。ccpa作为一种新型的攻击方式,具有相当大的危害性。通过精心设计协调的网络攻击,可以掩盖物理攻击对传感器测量的负面影响,并可以绕过坏数据检测器(BDD)。MTD策略可以对输电线路的电抗进行主动扰动,使得攻击者掌握的电网知识失效。本文首先根据MTD激活前ccpa不可检测的产生原理,分析了MTD激活后ccpa不可检测的产生机理;然后给出MTD激活后检测ccpa的改进传感器测量表达式。在IEEE 14总线、IEEE 30总线和IEEE 118总线系统上进行的大量仿真验证了该方法的简单性和有效性。
{"title":"Moving-Target Defense for Detecting Coordinated Cyber-Physical Attacks in Power Grids via a Modified Sensor Measurements Expression","authors":"Yu Jian","doi":"10.1145/3584714.3589127","DOIUrl":"https://doi.org/10.1145/3584714.3589127","url":null,"abstract":"This paper proposes a modified sensor measurement expression for moving target defense (MTD) method to detect coordinated cyber-physical attacks(CCPAs). As a new type of attack, CCPAs are considerably harmful. Through elaborately designing a coordinated cyber-attack, the negative effects of a physical attack on sensor measurements are masked and can bypass bad data detector(BDD). MTD strategy can actively perturb transmission lines’ reactances, which makes the knowledge of a power grid grasped by attackers invalid. In the paper, first, based on undetectable CCPAs production principle before MTD activation, the undetectable CCPAs’ production mechanism is analyzed after MTD activation; and then a modified sensor measurement expression for detecting CCPAs is provided after MTD activation. Extensive simulations implemented on IEEE 14-bus, IEEE 30-bus and IEEE 118-bus systems verify the simplicity and efficiency of the approach.","PeriodicalId":112952,"journal":{"name":"Proceedings of the 2022 International Conference on Cyber Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124245496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Change Technology of Encryption Strength Driven by Network Attack Threat 基于网络攻击威胁的加密强度自适应变化技术
Pub Date : 2022-12-16 DOI: 10.1145/3584714.3589125
lan kun, Ping Kuang, Fan Yang
Under the new situation that premeditated and persistent attacks have become the norm, resource-constrained industrial control equipment uses traditional encryption protection methods with fixed encryption strength and faces challenges such as simple stacking of protection capabilities, waste of resources and weak protection capabilities. Firstly, the technical principle of dynamic change of encryption strength driven by attack threat is discussed, and then the technology of adaptive change of encryption strength driven by attack threat (TD-ESAT) is proposed. Experiments and analysis show that in the real-time operation scenario of industrial control equipment, the protection efficiency of this method is significantly improved.
在有预谋、持续攻击成为常态的新形势下,资源受限的工控设备采用传统加密保护方式,加密强度固定,面临保护能力简单叠加、资源浪费、保护能力弱等挑战。首先讨论了攻击威胁驱动下加密强度动态变化的技术原理,然后提出了攻击威胁驱动下加密强度自适应变化技术(TD-ESAT)。实验和分析表明,在工控设备的实时运行场景中,该方法的保护效率显著提高。
{"title":"Adaptive Change Technology of Encryption Strength Driven by Network Attack Threat","authors":"lan kun, Ping Kuang, Fan Yang","doi":"10.1145/3584714.3589125","DOIUrl":"https://doi.org/10.1145/3584714.3589125","url":null,"abstract":"Under the new situation that premeditated and persistent attacks have become the norm, resource-constrained industrial control equipment uses traditional encryption protection methods with fixed encryption strength and faces challenges such as simple stacking of protection capabilities, waste of resources and weak protection capabilities. Firstly, the technical principle of dynamic change of encryption strength driven by attack threat is discussed, and then the technology of adaptive change of encryption strength driven by attack threat (TD-ESAT) is proposed. Experiments and analysis show that in the real-time operation scenario of industrial control equipment, the protection efficiency of this method is significantly improved.","PeriodicalId":112952,"journal":{"name":"Proceedings of the 2022 International Conference on Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128690909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Common Vulnerabilities and Exposures to Produce Security Trends 分析常见的漏洞和暴露,产生安全趋势
Pub Date : 2022-12-16 DOI: 10.1145/3584714.3584718
Norman Santiago, Janelli Mendez
Around two decades ago, we could not book plane tickets over the phone. As years go by, we invented and built multiple technological advances to make our lives more convenient than before. But this exposes us to different threats and vulnerabilities our devices bring to us. According to the National Vulnerability Database and iterated by Hoole et al., the publicly disclosed security issues are increasing rapidly, as observed in 2018. It has risen by 12.8% from the previous year. To further understand these threats, the researchers aim to provide an analysis of the common vulnerabilities and exposure database by MITRE by using a dynamic topic modelling called the BerTopic model. In addition, the research intends to produce security threat trends over the past years to see which threats have risen in the past decade.
大约20年前,我们还不能通过电话预订机票。随着岁月的流逝,我们发明并建立了多种技术进步,使我们的生活比以前更方便。但这让我们暴露在设备带给我们的不同威胁和漏洞中。根据美国国家漏洞数据库(National Vulnerability Database)和Hoole等人的反复研究,2018年,公开披露的安全问题正在迅速增加。它比前一年增长了12.8%。为了进一步了解这些威胁,研究人员旨在通过使用称为BerTopic模型的动态主题建模,对MITRE的常见漏洞和暴露数据库进行分析。此外,该研究还打算得出过去几年的安全威胁趋势,看看哪些威胁在过去十年中有所上升。
{"title":"Analysis of Common Vulnerabilities and Exposures to Produce Security Trends","authors":"Norman Santiago, Janelli Mendez","doi":"10.1145/3584714.3584718","DOIUrl":"https://doi.org/10.1145/3584714.3584718","url":null,"abstract":"Around two decades ago, we could not book plane tickets over the phone. As years go by, we invented and built multiple technological advances to make our lives more convenient than before. But this exposes us to different threats and vulnerabilities our devices bring to us. According to the National Vulnerability Database and iterated by Hoole et al., the publicly disclosed security issues are increasing rapidly, as observed in 2018. It has risen by 12.8% from the previous year. To further understand these threats, the researchers aim to provide an analysis of the common vulnerabilities and exposure database by MITRE by using a dynamic topic modelling called the BerTopic model. In addition, the research intends to produce security threat trends over the past years to see which threats have risen in the past decade.","PeriodicalId":112952,"journal":{"name":"Proceedings of the 2022 International Conference on Cyber Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127058628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation and Prediction of Network QoS Based on Multidimensional Data 基于多维数据的网络QoS评价与预测
Pub Date : 2022-12-16 DOI: 10.1145/3584714.3584724
Ming wei Sun, Qing wei Zhang, Hai yuan Zhao
With the rapid development of modern society and economy, Internet has been widely used in all walks of life, and plays an irreplaceable important role. At the same time, the quality of computer network service has been put forward more specific requirements. How to realize network QoS assurance is always a hot research topic in the Internet field. This paper analyzes the defects of the current comprehensive evaluation of network QoS. Considering the shortcomings of traditional data processing methods will be infinitely magnified in the face of a large amount of data and various types of data, the author uses SAE network model to reduce data dimension and extract features. Then the improved GRA-TOPSIS model is used to comprehensively evaluate the network QoS. Finally, the improved Gray GM(1,1) model is used to predict the network performance, which provides a new idea for multi-level and multi-criteria evaluation and prediction.
随着现代社会经济的飞速发展,互联网已广泛应用于各行各业,并发挥着不可替代的重要作用。同时,对计算机网络服务质量提出了更具体的要求。如何实现网络的QoS保证一直是互联网领域的研究热点。分析了目前网络QoS综合评价存在的缺陷。考虑到传统数据处理方法的缺点在面对大量数据和各种类型的数据时会被无限放大,笔者采用SAE网络模型对数据进行降维和特征提取。然后利用改进的GRA-TOPSIS模型对网络QoS进行综合评价。最后,利用改进的灰色GM(1,1)模型对网络性能进行预测,为多层次、多准则的评价和预测提供了新的思路。
{"title":"Evaluation and Prediction of Network QoS Based on Multidimensional Data","authors":"Ming wei Sun, Qing wei Zhang, Hai yuan Zhao","doi":"10.1145/3584714.3584724","DOIUrl":"https://doi.org/10.1145/3584714.3584724","url":null,"abstract":"With the rapid development of modern society and economy, Internet has been widely used in all walks of life, and plays an irreplaceable important role. At the same time, the quality of computer network service has been put forward more specific requirements. How to realize network QoS assurance is always a hot research topic in the Internet field. This paper analyzes the defects of the current comprehensive evaluation of network QoS. Considering the shortcomings of traditional data processing methods will be infinitely magnified in the face of a large amount of data and various types of data, the author uses SAE network model to reduce data dimension and extract features. Then the improved GRA-TOPSIS model is used to comprehensively evaluate the network QoS. Finally, the improved Gray GM(1,1) model is used to predict the network performance, which provides a new idea for multi-level and multi-criteria evaluation and prediction.","PeriodicalId":112952,"journal":{"name":"Proceedings of the 2022 International Conference on Cyber Security","volume":"275 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134344058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A symmetric additive homomorphic encryption scheme based on NTRU proxy rekeys 一种基于NTRU代理密钥的对称加性同态加密方案
Pub Date : 2022-12-16 DOI: 10.1145/3584714.3584720
Wei Liu, Hua Xiao Hao, Lan Ai Wan, Kai Xu, Mu Han, Long Xiao Zhu
To address the problems that homomorphic encryption cannot achieve secret sharing and existing Paillier cryptosystems cannot resist quantum attacks and are not suitable for scenarios where encrypted data is only uploaded by the data owner, this paper designs an NTRU (number theory research unit) based symmetric additive homomorphic encryption-proxy rekey (PAHE-PRK) scheme using the ideas of proxy rekeying and symmetric encryption based on the approximate convention number problem and the ring fault-tolerant learning problem. research unit) Proxy ReKey-based Symmetric Additive Homomorphic Encryption scheme (Partially Additive Homomorphic Encryption-Proxy ReKey, PAHE-PRK). The proxy can not only perform homomorphic computation on the original ciphertext, but also re-encrypt the homomorphic key so that the trusted user can obtain the homomorphic key to decrypt the ciphertext, thus achieving secret sharing and privacy protection. Finally, the performance and security of the proposed scheme are discussed in comparison with the traditional Paillier cryptosystem and the proxy re-encryption scheme based on the fault-tolerant learning problem, showing that the proposed scheme is faster in encryption and decryption, has less computation and storage overhead, and is resistant to the indistinguishability under chosen plaintext attack (IND-CPA).
针对同态加密无法实现秘密共享、现有Paillier密码系统无法抵抗量子攻击、不适合加密数据仅由数据所有者上传的场景等问题,本文基于近似约定数问题和环容错学习问题,利用代理重钥和对称加密的思想,设计了一种基于NTRU(数论研究单元)的对称加性同态加密-代理重钥(PAHE-PRK)方案。基于Proxy ReKey的对称加性同态加密方案(partial Additive Homomorphic Encryption-Proxy ReKey, PAHE-PRK)。代理不仅可以对原始密文进行同态计算,还可以对同态密钥进行重新加密,使受信任用户可以获得同态密钥解密密文,从而实现秘密共享和隐私保护。最后,通过与传统的Paillier密码系统和基于容错学习问题的代理重加密方案进行比较,讨论了该方案的性能和安全性,结果表明,该方案的加解密速度更快,计算和存储开销更小,并且能够抵抗选择明文攻击下的不可分辨性。
{"title":"A symmetric additive homomorphic encryption scheme based on NTRU proxy rekeys","authors":"Wei Liu, Hua Xiao Hao, Lan Ai Wan, Kai Xu, Mu Han, Long Xiao Zhu","doi":"10.1145/3584714.3584720","DOIUrl":"https://doi.org/10.1145/3584714.3584720","url":null,"abstract":"To address the problems that homomorphic encryption cannot achieve secret sharing and existing Paillier cryptosystems cannot resist quantum attacks and are not suitable for scenarios where encrypted data is only uploaded by the data owner, this paper designs an NTRU (number theory research unit) based symmetric additive homomorphic encryption-proxy rekey (PAHE-PRK) scheme using the ideas of proxy rekeying and symmetric encryption based on the approximate convention number problem and the ring fault-tolerant learning problem. research unit) Proxy ReKey-based Symmetric Additive Homomorphic Encryption scheme (Partially Additive Homomorphic Encryption-Proxy ReKey, PAHE-PRK). The proxy can not only perform homomorphic computation on the original ciphertext, but also re-encrypt the homomorphic key so that the trusted user can obtain the homomorphic key to decrypt the ciphertext, thus achieving secret sharing and privacy protection. Finally, the performance and security of the proposed scheme are discussed in comparison with the traditional Paillier cryptosystem and the proxy re-encryption scheme based on the fault-tolerant learning problem, showing that the proposed scheme is faster in encryption and decryption, has less computation and storage overhead, and is resistant to the indistinguishability under chosen plaintext attack (IND-CPA).","PeriodicalId":112952,"journal":{"name":"Proceedings of the 2022 International Conference on Cyber Security","volume":"422 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126989000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI and Fake News: A Conceptual Framework for Fake News Detection 人工智能与假新闻:假新闻检测的概念框架
Pub Date : 2022-12-16 DOI: 10.1145/3584714.3584722
Leila Ameli, Md Shah Alam Chowdhury, Farnaz Farid, Abubakar Bello, Fariza Sabrina, Alana Maurushat
In today's world, Cyberspace plays an essential part in an individual's life. Many people heavily depend on social media to get information and read the news. Such excessive reliance on Cyberspace, specifically on social media, has created vast room for many cybercrimes, such as the rapid spread of Fake News and misinformation. Additionally, the possibility of generating fake compelling content has become more accessible. Thanks to the rapid growth of the Internet and the adaption of Artificial Intelligence (AI) technologies. AI technologies are a two-edged sword. They are capable of positive improvements, e.g. detecting misinformation, fake or altered images and videos, identifying bots, and processing and retaining information better than humans. On the other hand, when used by malicious actors, there is a significant threat to the digital, physical, and political landscape. Additionally, the increasing use of social media platforms, specifically Facebook and Twitter, has allowed the public to spread opinions and information quickly, whether factual or not. Therefore, there is a need for further research and collaboration to understand how to identify and combat the spread of fake news and disinformation and prevent the malicious use of AI technologies whilst preventing infringement of privacy guidelines. To this end, in this study, we propose a conceptual framework to classify and detect fake news. The three-tier framework features characterisation and feature extraction, classification and detection, and the final feature is defence.
在当今世界,网络空间在个人生活中发挥着重要作用。许多人严重依赖社交媒体来获取信息和阅读新闻。这种对网络空间,特别是社交媒体的过度依赖,为许多网络犯罪创造了巨大的空间,比如假新闻和错误信息的迅速传播。此外,生成引人注目的虚假内容的可能性也变得更容易获得。由于互联网的快速发展和人工智能(AI)技术的应用。人工智能技术是一把双刃剑。它们有能力进行积极的改进,例如检测错误信息、伪造或修改的图像和视频、识别机器人,以及比人类更好地处理和保留信息。另一方面,当被恶意行为者使用时,会对数字、物理和政治环境造成重大威胁。此外,越来越多地使用社交媒体平台,特别是Facebook和Twitter,使得公众能够迅速传播观点和信息,无论事实与否。因此,有必要进一步研究和合作,以了解如何识别和打击假新闻和虚假信息的传播,防止恶意使用人工智能技术,同时防止侵犯隐私准则。为此,在本研究中,我们提出了一个概念框架来分类和检测假新闻。该框架分为三层,主要包括特征描述和特征提取、分类和检测,最后是防御。
{"title":"AI and Fake News: A Conceptual Framework for Fake News Detection","authors":"Leila Ameli, Md Shah Alam Chowdhury, Farnaz Farid, Abubakar Bello, Fariza Sabrina, Alana Maurushat","doi":"10.1145/3584714.3584722","DOIUrl":"https://doi.org/10.1145/3584714.3584722","url":null,"abstract":"In today's world, Cyberspace plays an essential part in an individual's life. Many people heavily depend on social media to get information and read the news. Such excessive reliance on Cyberspace, specifically on social media, has created vast room for many cybercrimes, such as the rapid spread of Fake News and misinformation. Additionally, the possibility of generating fake compelling content has become more accessible. Thanks to the rapid growth of the Internet and the adaption of Artificial Intelligence (AI) technologies. AI technologies are a two-edged sword. They are capable of positive improvements, e.g. detecting misinformation, fake or altered images and videos, identifying bots, and processing and retaining information better than humans. On the other hand, when used by malicious actors, there is a significant threat to the digital, physical, and political landscape. Additionally, the increasing use of social media platforms, specifically Facebook and Twitter, has allowed the public to spread opinions and information quickly, whether factual or not. Therefore, there is a need for further research and collaboration to understand how to identify and combat the spread of fake news and disinformation and prevent the malicious use of AI technologies whilst preventing infringement of privacy guidelines. To this end, in this study, we propose a conceptual framework to classify and detect fake news. The three-tier framework features characterisation and feature extraction, classification and detection, and the final feature is defence.","PeriodicalId":112952,"journal":{"name":"Proceedings of the 2022 International Conference on Cyber Security","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115990370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anomaly detection of traffic session based on graph neural network 基于图神经网络的流量会话异常检测
Pub Date : 2022-12-16 DOI: 10.1145/3584714.3584715
Peng Du, Chengwei Peng, Peng Xiang, Qingshan Li
In recent years, with the development of network technology, methods of network security threats have emerged in endlessly. Most of the existing network anomaly detection researches cannot meet the requirements of network security detection. The traditional network anomaly detection methods based on static rule matching and machine learning don't perform well in the complex and dynamic network environment, and it is highly dependent on the statistical features designed by the expert in the specific domain. This paper proposes a traffic session anomaly detection method based on graph neural network, called TSGNN, which extracts the protocol features from the original Packet Capture(PACP) file and form the session representation, further use the gate recurrent unit(GRU) to extract the internal characteristics of the traffic data protocol field, then constructs a directed graph from session packet structure relationships and uses the graph neural network model to learn association features between graph nodes, and finally inputs the graph representation feature vector into fully connected network layer for classification. The experimental results show that our method is superior to the existing research in the evaluation indicators on the CSE-CIC-IDS2018 datasets.
近年来,随着网络技术的发展,网络安全威胁的方法层出不穷。现有的网络异常检测研究大多不能满足网络安全检测的要求。传统的基于静态规则匹配和机器学习的网络异常检测方法在复杂、动态的网络环境中表现不佳,并且高度依赖于专家在特定领域设计的统计特征。本文提出了一种基于图神经网络的流量会话异常检测方法TSGNN,该方法从原始PACP (Packet Capture)文件中提取协议特征,形成会话表示,再利用门循环单元(GRU)提取流量数据协议字段的内部特征。然后根据会话包结构关系构造有向图,利用图神经网络模型学习图节点之间的关联特征,最后将图表示特征向量输入到全连通网络层进行分类。实验结果表明,我们的方法在CSE-CIC-IDS2018数据集上的评价指标优于现有研究。
{"title":"Anomaly detection of traffic session based on graph neural network","authors":"Peng Du, Chengwei Peng, Peng Xiang, Qingshan Li","doi":"10.1145/3584714.3584715","DOIUrl":"https://doi.org/10.1145/3584714.3584715","url":null,"abstract":"In recent years, with the development of network technology, methods of network security threats have emerged in endlessly. Most of the existing network anomaly detection researches cannot meet the requirements of network security detection. The traditional network anomaly detection methods based on static rule matching and machine learning don't perform well in the complex and dynamic network environment, and it is highly dependent on the statistical features designed by the expert in the specific domain. This paper proposes a traffic session anomaly detection method based on graph neural network, called TSGNN, which extracts the protocol features from the original Packet Capture(PACP) file and form the session representation, further use the gate recurrent unit(GRU) to extract the internal characteristics of the traffic data protocol field, then constructs a directed graph from session packet structure relationships and uses the graph neural network model to learn association features between graph nodes, and finally inputs the graph representation feature vector into fully connected network layer for classification. The experimental results show that our method is superior to the existing research in the evaluation indicators on the CSE-CIC-IDS2018 datasets.","PeriodicalId":112952,"journal":{"name":"Proceedings of the 2022 International Conference on Cyber Security","volume":"446 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122889145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2022 International Conference on Cyber Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1