Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335559
Chang-Lung Tsai, Allen Y. Chang, Chun-Jung Chen, Wen-Jieh Yu, Ling-Hong Chen
In this paper, a novel intrusion detection system based on diversity timing factor, combining the characteristic of dynamic and static adaption, sniffing from multi-stage and analyzing with multi-dimensional hidden Markov model has been proposed. In the proposed mechanism, detection, expert, and console modules are developed. In which, the detection module is deployed with numbers of independent sensors on each node/device of the network. This module not only takes the responsibility to detect and collect all of the desired information on each different timing period and stage, but also denotes specific weighting function to indicate the significance of possible influence and tune the value according to the frequency and times of the occurrence of security events on each collected data. All of the collected audit data and detected normal/abnormal signals will be transferred to the database of the expert module for further integrated evaluation on those multiple observing factors and processed with synthetic information and associative events analysis based on hidden Markov model algorithm on multidimensional. After then, the fuzzy inferring rule is applied for intrusion recognition and identification. The console module is assigned to manage the performance of the system, control all of the sensors for monitoring security events and generate alerts and offer periodically reports and present proposals for taking suitable response and making optimal decision. Experimental results demonstrate that the proposed IDS mechanism possesses good efficiency and performance.
{"title":"Dynamic intrusion detection system based on feature extraction and multidimensional hidden Markov model analysis","authors":"Chang-Lung Tsai, Allen Y. Chang, Chun-Jung Chen, Wen-Jieh Yu, Ling-Hong Chen","doi":"10.1109/CCST.2009.5335559","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335559","url":null,"abstract":"In this paper, a novel intrusion detection system based on diversity timing factor, combining the characteristic of dynamic and static adaption, sniffing from multi-stage and analyzing with multi-dimensional hidden Markov model has been proposed. In the proposed mechanism, detection, expert, and console modules are developed. In which, the detection module is deployed with numbers of independent sensors on each node/device of the network. This module not only takes the responsibility to detect and collect all of the desired information on each different timing period and stage, but also denotes specific weighting function to indicate the significance of possible influence and tune the value according to the frequency and times of the occurrence of security events on each collected data. All of the collected audit data and detected normal/abnormal signals will be transferred to the database of the expert module for further integrated evaluation on those multiple observing factors and processed with synthetic information and associative events analysis based on hidden Markov model algorithm on multidimensional. After then, the fuzzy inferring rule is applied for intrusion recognition and identification. The console module is assigned to manage the performance of the system, control all of the sensors for monitoring security events and generate alerts and offer periodically reports and present proposals for taking suitable response and making optimal decision. Experimental results demonstrate that the proposed IDS mechanism possesses good efficiency and performance.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129159474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335541
R. Sánchez-Reillo, Ivan Rubio-Polo, R. Alonso-Moreno, Aitor Mendaza-Ormaza
Citizen Cards are being deployed nowadays. Several applications are being developed using such cards. Different kind of services can be provided with such cards, from services demanded by the Administration, to applications from private companies. Unfortunately there is a great amount of applications that are not able nowadays to use the security these cards offer, due to their requirement of keeping the end-user anonymous. This requirement can be forced by the kind of application (e.g. restricted to certain ages), of by data protection laws, where there is no need to access personal data to provide a local service. Authors are proposing in this paper two solutions for this kind of services, benefiting from the already deployed citizen cards, reducing the cost of developing a new card, as well as maintain the card system.
{"title":"Privacy friendly applications using citizen cards based on cryptographic smartcards","authors":"R. Sánchez-Reillo, Ivan Rubio-Polo, R. Alonso-Moreno, Aitor Mendaza-Ormaza","doi":"10.1109/CCST.2009.5335541","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335541","url":null,"abstract":"Citizen Cards are being deployed nowadays. Several applications are being developed using such cards. Different kind of services can be provided with such cards, from services demanded by the Administration, to applications from private companies. Unfortunately there is a great amount of applications that are not able nowadays to use the security these cards offer, due to their requirement of keeping the end-user anonymous. This requirement can be forced by the kind of application (e.g. restricted to certain ages), of by data protection laws, where there is no need to access personal data to provide a local service. Authors are proposing in this paper two solutions for this kind of services, benefiting from the already deployed citizen cards, reducing the cost of developing a new card, as well as maintain the card system.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123119817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335531
Chang-Lung Tsai, Chun-Chi Tseng, Chin-Chuan Han
In this paper, a novel intrusion behavior analysis mechanism based on the design of honey pot and the diagnosis of ant colony algorithm has been proposed. In which, there are monitor module, track module, and analysis module developed. The intrusive behavior is then analyzed through the above modules. In the developed honey pot, all of the architecture, database, directory, security parameters are updated dynamically and timely to evade the probe test from the intruders. To record the traverse of an intrusion, the pheromone will be deposited as discovered. In addition, in order to exactly and correctly measure the capability of the intruders, the content of those discovered file, path and database will be updated and the security setting will also be enhanced timely to raise the difficulty of visiting or access again. All of the traverse of intruders and the corresponding behavior will be analyzed based on ant colony algorithm. Experimental results demonstrate that the proposed IDS mechanism possesses good efficiency and performance.
{"title":"Intrusive behavior analysis based on honey pot tracking and ant algorithm analysis","authors":"Chang-Lung Tsai, Chun-Chi Tseng, Chin-Chuan Han","doi":"10.1109/CCST.2009.5335531","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335531","url":null,"abstract":"In this paper, a novel intrusion behavior analysis mechanism based on the design of honey pot and the diagnosis of ant colony algorithm has been proposed. In which, there are monitor module, track module, and analysis module developed. The intrusive behavior is then analyzed through the above modules. In the developed honey pot, all of the architecture, database, directory, security parameters are updated dynamically and timely to evade the probe test from the intruders. To record the traverse of an intrusion, the pheromone will be deposited as discovered. In addition, in order to exactly and correctly measure the capability of the intruders, the content of those discovered file, path and database will be updated and the security setting will also be enhanced timely to raise the difficulty of visiting or access again. All of the traverse of intruders and the corresponding behavior will be analyzed based on ant colony algorithm. Experimental results demonstrate that the proposed IDS mechanism possesses good efficiency and performance.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130481606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335537
K. Harman
The OmniTrax® leaky coaxial cable perimeter intrusion detection system was first introduced at the 2004 International Carnahan Conference [1]. This sensor evolved from the technology of “GUIDAR” pioneered in the 1970's to bring intrusion location to perimeter sensors. OmniTrax theory of operation, based on a unique application of new Ultra Wideband Radar was described, as well as its feature of allowing pinpoint location of intrusions along 800m of sensor cable using a single processor. This feature is fundamentally important to direct the response force, and also for rapid debug and maintenance of the installation. Since that first presentation the sensor has been fully realized as one of the most cost-effective ranging perimeter sensors with its own integrated power and communications network. It has also been evaluated for both detection and environmental performance at our own local test site (SITE), and at independent government sensor test agencies. Further components of the technology have been developed to enlarge the range of site applications. This paper provides an update on the technology and its application including some new applications for leaky coaxial cable technology. One such new application has been selected for more detailed discussion in the paper entitled “A Rapid Deployment Guided Radar Sensor” that also appears in these proceedings.
{"title":"Omnitrax ranging leaky coaxial cable sensor technology update","authors":"K. Harman","doi":"10.1109/CCST.2009.5335537","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335537","url":null,"abstract":"The OmniTrax® leaky coaxial cable perimeter intrusion detection system was first introduced at the 2004 International Carnahan Conference [1]. This sensor evolved from the technology of “GUIDAR” pioneered in the 1970's to bring intrusion location to perimeter sensors. OmniTrax theory of operation, based on a unique application of new Ultra Wideband Radar was described, as well as its feature of allowing pinpoint location of intrusions along 800m of sensor cable using a single processor. This feature is fundamentally important to direct the response force, and also for rapid debug and maintenance of the installation. Since that first presentation the sensor has been fully realized as one of the most cost-effective ranging perimeter sensors with its own integrated power and communications network. It has also been evaluated for both detection and environmental performance at our own local test site (SITE), and at independent government sensor test agencies. Further components of the technology have been developed to enlarge the range of site applications. This paper provides an update on the technology and its application including some new applications for leaky coaxial cable technology. One such new application has been selected for more detailed discussion in the paper entitled “A Rapid Deployment Guided Radar Sensor” that also appears in these proceedings.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130684142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335558
T. Yasuhira
The National Police Agency has contributed to the construction, maintenance, and management of its own nationwide info-communications network composed of a microwave radio system operated by the NPA, dedicated lines leased from major carriers and so on. Due to overhanging crises of natural disasters and threats posed by people of malicious intent to the confidential police network, the NPA is urgently exposed to the pressure to upgrade its internal network system. Thanks to the remarkable progress in the field of IT, more securely and qualitatively reliable communications and efficient methods for information sharing have been actively proposed and developed by various IT vendors. By taking advantage of the latest technologies, the NPA is under the way to strengthen the whole of its own network.
{"title":"Fundamental upgrade of the internal network system within the National Police Agency of Japan","authors":"T. Yasuhira","doi":"10.1109/CCST.2009.5335558","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335558","url":null,"abstract":"The National Police Agency has contributed to the construction, maintenance, and management of its own nationwide info-communications network composed of a microwave radio system operated by the NPA, dedicated lines leased from major carriers and so on. Due to overhanging crises of natural disasters and threats posed by people of malicious intent to the confidential police network, the NPA is urgently exposed to the pressure to upgrade its internal network system. Thanks to the remarkable progress in the field of IT, more securely and qualitatively reliable communications and efficient methods for information sharing have been actively proposed and developed by various IT vendors. By taking advantage of the latest technologies, the NPA is under the way to strengthen the whole of its own network.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131243893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335556
Giovanni Contardi, F. Garzia, R. Cusani
The security of a complex site is strongly dependent on the use of integrated technological systems. Any weakness of the integrated system involves a weakness of the security of the site itself. For this reason it is necessary to design and realize highly integrated, efficient and reliable security systems. The authors illustrate the work made to design and realize the integrated security system of the Senate of the Italian Republic.)
{"title":"The integrated security system of the Senate of the Italian Republic","authors":"Giovanni Contardi, F. Garzia, R. Cusani","doi":"10.1109/CCST.2009.5335556","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335556","url":null,"abstract":"The security of a complex site is strongly dependent on the use of integrated technological systems. Any weakness of the integrated system involves a weakness of the security of the site itself. For this reason it is necessary to design and realize highly integrated, efficient and reliable security systems. The authors illustrate the work made to design and realize the integrated security system of the Senate of the Italian Republic.)","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130497429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In 2005, Pon et al. proposed a generalized signature scheme based on the intractability of solving two well-known cryptographic assumptions, the factorization (FAC) and the discrete logarithm problem (DLP). They claimed that their scheme is still secure, provided that one of these two assumptions is solved. This paper, however, will show that Pon et al.'s scheme is insecure against the universal forgery attack if the adversary can solve the DLP.
{"title":"Security of generalized signature scheme based on discrete logarithms and factorization","authors":"Chien-Lung Hsu, Yu-Hao Chuang, Wei-Hua He, So-Lin Yen, C. Tseng, Chia-Wen Chen","doi":"10.1109/CCST.2009.5335530","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335530","url":null,"abstract":"In 2005, Pon et al. proposed a generalized signature scheme based on the intractability of solving two well-known cryptographic assumptions, the factorization (FAC) and the discrete logarithm problem (DLP). They claimed that their scheme is still secure, provided that one of these two assumptions is solved. This paper, however, will show that Pon et al.'s scheme is insecure against the universal forgery attack if the adversary can solve the DLP.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133744917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335566
Hofer Franziska, Wetter Olive Emil, Graf Roland
The nature of the daily security business at airports (e.g. fast changing regulations) demands more and more flexible training and communication solutions for security officers at airports. Classical classroom training is a proven way for (re− training, but alternative tools, in particular e-solutions, could be taken into account more often to support the classical method of training.
{"title":"Using learning content management systems as highly adaptive and efficient supporting tool for (recurrent) training — an applied perspective","authors":"Hofer Franziska, Wetter Olive Emil, Graf Roland","doi":"10.1109/CCST.2009.5335566","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335566","url":null,"abstract":"The nature of the daily security business at airports (e.g. fast changing regulations) demands more and more flexible training and communication solutions for security officers at airports. Classical classroom training is a proven way for (re− training, but alternative tools, in particular e-solutions, could be taken into account more often to support the classical method of training.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130147511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335516
Z. Vintr, D. Valis
Operation of a number of technical systems is related to the danger of events' occurrence posing threat to human health and life, resulting in material damage or damage to the environment. Methods and procedures used for risk management take into consideration also a failure of a human factor as a possible cause of dangerous events' occurrence, but they do not give us opportunity to take into account a possible intention of man who can cause a dangerous event on purpose. In view of the terrorist threat we lack a coherent methodology which would enable us to influence system ability so that it could reduce its consequences or it could be protected against misuse by its design solution. This ability of a system is called robustness against misuse. The article presents fundamental approaches of new methodology which enable us to specify systems' robustness requirements, to describe and classify “weak” points of the systems, to analyze and assess robustness level, and to find and suggest effective ways of increasing the systems' robustness against misuse. The presented methodology is based on the assumption that similarly, as in case of dependability and safety, the assurance of system robustness should be also an object of systematic attention in all phases of the system life cycle, and that the system robustness against misuse is formed in a crucial manner mainly in the early phases of a life cycle (so called premanufacturing stages - conception, development, design).
{"title":"Robustness against misuse - a new attribute of technical systems","authors":"Z. Vintr, D. Valis","doi":"10.1109/CCST.2009.5335516","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335516","url":null,"abstract":"Operation of a number of technical systems is related to the danger of events' occurrence posing threat to human health and life, resulting in material damage or damage to the environment. Methods and procedures used for risk management take into consideration also a failure of a human factor as a possible cause of dangerous events' occurrence, but they do not give us opportunity to take into account a possible intention of man who can cause a dangerous event on purpose. In view of the terrorist threat we lack a coherent methodology which would enable us to influence system ability so that it could reduce its consequences or it could be protected against misuse by its design solution. This ability of a system is called robustness against misuse. The article presents fundamental approaches of new methodology which enable us to specify systems' robustness requirements, to describe and classify “weak” points of the systems, to analyze and assess robustness level, and to find and suggest effective ways of increasing the systems' robustness against misuse. The presented methodology is based on the assumption that similarly, as in case of dependability and safety, the assurance of system robustness should be also an object of systematic attention in all phases of the system life cycle, and that the system robustness against misuse is formed in a crucial manner mainly in the early phases of a life cycle (so called premanufacturing stages - conception, development, design).","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114261560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-13DOI: 10.1109/CCST.2009.5335512
O. Miguel-Hurtado, L. Mengibar-Pozo, Inmaculada Tomeo-Reyes, J. Liu-Jimenez
This paper deals with the Signature Data Formats proposed by ISO 19794 project: 19794 part 7 Full Format and Compact Format (published in 2007) and the new 19794 part 11, which is under development. It will be shown how these formats handle the raw data coming from a Signature Input Device, and what the size of a Biometric Information Record is for each one. Another compression method, using LZ77 compression algorithm, is proposed and tested. The paper will also show the impact of using these compact formats on the performance of two different algorithms: Dynamic Time Warping and Gaussian Mixture Models. MCyT and SVC2004 signature databases have been used to carry out all tests.
{"title":"Analysis on compact data formats for the performance of handwritten signature biometrics","authors":"O. Miguel-Hurtado, L. Mengibar-Pozo, Inmaculada Tomeo-Reyes, J. Liu-Jimenez","doi":"10.1109/CCST.2009.5335512","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335512","url":null,"abstract":"This paper deals with the Signature Data Formats proposed by ISO 19794 project: 19794 part 7 Full Format and Compact Format (published in 2007) and the new 19794 part 11, which is under development. It will be shown how these formats handle the raw data coming from a Signature Input Device, and what the size of a Biometric Information Record is for each one. Another compression method, using LZ77 compression algorithm, is proposed and tested. The paper will also show the impact of using these compact formats on the performance of two different algorithms: Dynamic Time Warping and Gaussian Mixture Models. MCyT and SVC2004 signature databases have been used to carry out all tests.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129398230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}