首页 > 最新文献

2010 Fourth International Conference on Network and System Security最新文献

英文 中文
Five Criteria for Web-Services Security Architecture web服务安全体系结构的五个标准
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.100
R. Addie, A. Colman
Five properties of an architecture for secure access to web services are defined and two existing architectures are evaluated according to these criteria. References to these criteria in the literature and evaluation of the security architectures are tabulated in the conclusion. Policy-sufficiency is defined as the requirement that any meaningful statements can be expressed in policy definitions of the architecture. Protocol neutrality is the requirement that a protocol exchange which is logically equivalent to a valid protocol sequence is also valid. Predicateboundedness is the constraint that a fixed, finite set of predicates (or language constructs) will be sufficient for security policy definitions, i.e. the language does not need to be incrementally extended indefinitely. Protocol-closure requires that security protocols can be combined together arbitrarily to make new protocols. Finally, processing complexity constrains algorithms for evaluating security rules to be of satisfactory (low) complexity. No existing security architectures recieve a tick for all five of these criteria. The RW architecture is more successful in this regard than the simpler XACML architecture.
定义了用于安全访问web服务的体系结构的五个属性,并根据这些标准评估了两个现有体系结构。在结论部分列出了文献中对这些标准的引用和对安全体系结构的评估。策略充分性被定义为任何有意义的语句都可以在体系结构的策略定义中表示的需求。协议中立性是指逻辑上等同于有效协议序列的协议交换也是有效的要求。谓词有界性是一种约束,即一组固定的、有限的谓词(或语言结构)对于安全策略定义就足够了,也就是说,语言不需要无限地增量扩展。协议闭包要求安全协议可以任意组合在一起,形成新的协议。最后,处理复杂度限制了评估安全规则的算法具有令人满意的(低)复杂度。没有任何现有的安全体系结构能够满足所有这五个标准。在这方面,RW体系结构比简单的XACML体系结构更成功。
{"title":"Five Criteria for Web-Services Security Architecture","authors":"R. Addie, A. Colman","doi":"10.1109/NSS.2010.100","DOIUrl":"https://doi.org/10.1109/NSS.2010.100","url":null,"abstract":"Five properties of an architecture for secure access to web services are defined and two existing architectures are evaluated according to these criteria. References to these criteria in the literature and evaluation of the security architectures are tabulated in the conclusion. Policy-sufficiency is defined as the requirement that any meaningful statements can be expressed in policy definitions of the architecture. Protocol neutrality is the requirement that a protocol exchange which is logically equivalent to a valid protocol sequence is also valid. Predicateboundedness is the constraint that a fixed, finite set of predicates (or language constructs) will be sufficient for security policy definitions, i.e. the language does not need to be incrementally extended indefinitely. Protocol-closure requires that security protocols can be combined together arbitrarily to make new protocols. Finally, processing complexity constrains algorithms for evaluating security rules to be of satisfactory (low) complexity. No existing security architectures recieve a tick for all five of these criteria. The RW architecture is more successful in this regard than the simpler XACML architecture.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126340955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DIPLOMA: Distributed Policy Enforcement Architecture for MANETs 文凭:面向manet的分布式策略执行架构
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.27
M. Alicherry, A. Keromytis
Lack of well-defined defense perimeter in MANETs prevents the use traditional firewalls, and requires the security to be implemented in a distributed manner. We recently introduced a novel deny-by-default distributed security policy enforcement architecture for MANETs by harnessing and extending the concept of {it network capabilities}. The {it deny-by-default} principle allows compromised nodes to access only authorized services, limiting their ability to disrupt or even interfere with end-to-end connectivity and nodes beyond their local communication radius. The enforcement of policies is done hop-by-hop, in a distributed manner. In this paper, we present the implementation of this architecture, called DIPLOMA, on Linux. Our implementation works at the network layer, and does not require any changes to existing applications. We identify the bottlenecks of the original architecture and propose improvements, including a signature optimization, so that it works well in practice. We present the results of evaluating the architecture in a realistic MANET testbed Orbit. The results show that the architecture incurs minimal overhead in throughput, latency and jitter. We also show that the system protects network bandwidth and the end-hosts in the presence of attackers. To that end, we identify ways of creating multi-hop topologies in indoor environments so that a bad node cannot interfere with every other node. We also show that existing applications are not impacted by the new architecture, achieving good performance.
在manet中缺乏定义良好的防御边界阻碍了传统防火墙的使用,并且要求以分布式方式实现安全性。我们最近通过利用和扩展{it网络功能}的概念,为manet引入了一种新的默认拒绝分布式安全策略实施体系结构。{it默认拒绝}原则允许受损节点仅访问授权服务,限制其中断甚至干扰端到端连接和超出其本地通信半径的节点的能力。策略的执行以一种分布式的方式逐跳执行。在本文中,我们介绍了该体系结构在Linux上的实现,称为DIPLOMA。我们的实现在网络层工作,不需要对现有应用程序进行任何更改。我们确定了原始体系结构的瓶颈,并提出了改进建议,包括签名优化,使其在实践中运行良好。我们给出了在一个实际的轨道机动网络测试平台上对该架构进行评估的结果。结果表明,该架构在吞吐量、延迟和抖动方面的开销最小。我们还展示了该系统在攻击者存在的情况下保护网络带宽和终端主机。为此,我们确定了在室内环境中创建多跳拓扑的方法,以便坏节点不会干扰其他节点。我们还展示了现有的应用程序不会受到新体系结构的影响,从而实现了良好的性能。
{"title":"DIPLOMA: Distributed Policy Enforcement Architecture for MANETs","authors":"M. Alicherry, A. Keromytis","doi":"10.1109/NSS.2010.27","DOIUrl":"https://doi.org/10.1109/NSS.2010.27","url":null,"abstract":"Lack of well-defined defense perimeter in MANETs prevents the use traditional firewalls, and requires the security to be implemented in a distributed manner. We recently introduced a novel deny-by-default distributed security policy enforcement architecture for MANETs by harnessing and extending the concept of {it network capabilities}. The {it deny-by-default} principle allows compromised nodes to access only authorized services, limiting their ability to disrupt or even interfere with end-to-end connectivity and nodes beyond their local communication radius. The enforcement of policies is done hop-by-hop, in a distributed manner. In this paper, we present the implementation of this architecture, called DIPLOMA, on Linux. Our implementation works at the network layer, and does not require any changes to existing applications. We identify the bottlenecks of the original architecture and propose improvements, including a signature optimization, so that it works well in practice. We present the results of evaluating the architecture in a realistic MANET testbed Orbit. The results show that the architecture incurs minimal overhead in throughput, latency and jitter. We also show that the system protects network bandwidth and the end-hosts in the presence of attackers. To that end, we identify ways of creating multi-hop topologies in indoor environments so that a bad node cannot interfere with every other node. We also show that existing applications are not impacted by the new architecture, achieving good performance.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129868900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Adaptive Clustering with Feature Ranking for DDoS Attacks Detection 基于特征排序的自适应聚类DDoS攻击检测
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.70
Lifang Zi, J. Yearwood, Xin-Wen Wu
Distributed Denial of Service (DDoS) attacks pose an increasing threat to the current internet. The detection of such attacks plays an important role in maintaining the security of networks. In this paper, we propose a novel adaptive clustering method combined with feature ranking for DDoS attacks detection. First, based on the analysis of network traffic, preliminary variables are selected. Second, the Modified Global K-means algorithm (MGKM) is used as the basic incremental clustering algorithm to identify the cluster structure of the target data. Third, the linear correlation coefficient is used for feature ranking. Lastly, the feature ranking result is used to inform and recalculate the clusters. This adaptive process can make worthwhile adjustments to the working feature vector according to different patterns of DDoS attacks, and can improve the quality of the clusters and the effectiveness of the clustering algorithm. The experimental results demonstrate that our method is effective and adaptive in detecting the separate phases of DDoS attacks.
分布式拒绝服务(DDoS)攻击对当前互联网构成了越来越大的威胁。检测此类攻击对维护网络安全起着重要的作用。本文提出了一种结合特征排序的自适应聚类方法用于DDoS攻击检测。首先,在对网络流量进行分析的基础上,选取初步变量。其次,采用改进的全局k均值算法(MGKM)作为基本的增量聚类算法,识别目标数据的聚类结构;第三,利用线性相关系数对特征进行排序。最后,利用特征排序结果通知聚类并重新计算聚类。这种自适应过程可以根据不同的DDoS攻击模式对工作特征向量进行有价值的调整,提高聚类的质量和聚类算法的有效性。实验结果表明,该方法对DDoS攻击的分阶段检测具有较好的有效性和适应性。
{"title":"Adaptive Clustering with Feature Ranking for DDoS Attacks Detection","authors":"Lifang Zi, J. Yearwood, Xin-Wen Wu","doi":"10.1109/NSS.2010.70","DOIUrl":"https://doi.org/10.1109/NSS.2010.70","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks pose an increasing threat to the current internet. The detection of such attacks plays an important role in maintaining the security of networks. In this paper, we propose a novel adaptive clustering method combined with feature ranking for DDoS attacks detection. First, based on the analysis of network traffic, preliminary variables are selected. Second, the Modified Global K-means algorithm (MGKM) is used as the basic incremental clustering algorithm to identify the cluster structure of the target data. Third, the linear correlation coefficient is used for feature ranking. Lastly, the feature ranking result is used to inform and recalculate the clusters. This adaptive process can make worthwhile adjustments to the working feature vector according to different patterns of DDoS attacks, and can improve the quality of the clusters and the effectiveness of the clustering algorithm. The experimental results demonstrate that our method is effective and adaptive in detecting the separate phases of DDoS attacks.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129545928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
An Approach to Specify Knowledge in Multi-agent Systems Using Petri Nets 基于Petri网的多智能体系统知识指定方法
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.58
E. Gonçalves
The use of approaches based on artificial intelligence, specially agents and multi-agents systems, permits to clearly distinguish the aspects of implementation and the knowledge that gives substrate to the system. Concerning the implementation aspects, there are some traditional frameworks and languages as AUML, Gaia, and JASON. However, this technologies are not comfortable in acquiring and structuring knowledge. In this paper, it is presented a Petri net model developed to specify knowledge in agents and multi-agent systems independently of frameworks and knowledge representation formalisms. The Petri net model presented permits to map the knowledge acquired and structured in any formalism and framework used to implement a computational system. Besides that, the Petri net tool permits to analyze and validate the knowledge elicited concerning aspects as redundancy, deadlocks and conditions associated to agent tasks. The main contribution of this approach is to shift the project focus to the knowledge level of the system.
使用基于人工智能的方法,特别是代理和多代理系统,可以清楚地区分实施的各个方面和为系统提供基础的知识。关于实现方面,有一些传统的框架和语言,如AUML、Gaia和JASON。然而,这些技术在获取和构建知识方面并不舒适。本文提出了一种独立于框架和知识表示形式的Petri网模型,用于在智能体和多智能体系统中指定知识。所提出的Petri网模型允许在用于实现计算系统的任何形式和框架中绘制所获得的知识和结构。除此之外,Petri网工具允许分析和验证关于冗余、死锁和与代理任务相关的条件等方面的知识。这种方法的主要贡献是将项目的焦点转移到系统的知识层面。
{"title":"An Approach to Specify Knowledge in Multi-agent Systems Using Petri Nets","authors":"E. Gonçalves","doi":"10.1109/NSS.2010.58","DOIUrl":"https://doi.org/10.1109/NSS.2010.58","url":null,"abstract":"The use of approaches based on artificial intelligence, specially agents and multi-agents systems, permits to clearly distinguish the aspects of implementation and the knowledge that gives substrate to the system. Concerning the implementation aspects, there are some traditional frameworks and languages as AUML, Gaia, and JASON. However, this technologies are not comfortable in acquiring and structuring knowledge. In this paper, it is presented a Petri net model developed to specify knowledge in agents and multi-agent systems independently of frameworks and knowledge representation formalisms. The Petri net model presented permits to map the knowledge acquired and structured in any formalism and framework used to implement a computational system. Besides that, the Petri net tool permits to analyze and validate the knowledge elicited concerning aspects as redundancy, deadlocks and conditions associated to agent tasks. The main contribution of this approach is to shift the project focus to the knowledge level of the system.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128740141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
HTTPSLock: Enforcing HTTPS in Unmodified Browsers with Cached Javascript httplock:在未修改的浏览器中使用缓存的Javascript强制HTTPS
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.84
Adonis P. H. Fung, K. Cheung
HTTPS is designed to protect a connection against eavesdropping and man-in-the-middle attacks. HTTPS is however often compromised and voided when users are to embrace invalid certificates or disregard if HTTPS is being used. The current HTTPS deployment relies on unsophisticated users to safeguard themselves by performing legitimacy judgment. We propose HTTPS Lock, a simple and immediate approach to enforce HTTPS security. HTTPS Lock can be deployed to a website with a valid certificate by simply including several Javascript and HTML files, which will be cached in browsers. Similar to the trust-on-first-use model used by SSH, the trusted code cached on the client-side can effectively enforce the use of HTTPS and forbid users to embrace invalid certificates for any compromised networks subsequently encountered. Over 72% of major web browsers are supported, and further growth is expected. In any situation where the protection is unsupported or expired, the current security standard is gracefully maintained. As desired, the deployment is not hindered by standardization and collaboration from browser vendors as with other proposals.
HTTPS旨在保护连接免受窃听和中间人攻击。然而,当用户接受无效证书或忽略正在使用HTTPS时,HTTPS经常被破坏和无效。目前的HTTPS部署依赖于简单的用户通过执行合法性判断来保护自己。我们提出HTTPS锁,一个简单而直接的方法来强制HTTPS安全。HTTPS锁可以通过简单地包含几个Javascript和HTML文件部署到具有有效证书的网站,这些文件将缓存在浏览器中。与SSH使用的首次使用信任模型类似,缓存在客户端上的受信任代码可以有效地强制使用HTTPS,并禁止用户为随后遇到的任何受损网络使用无效证书。它支持超过72%的主流浏览器,预计还会进一步增长。在保护不受支持或过期的任何情况下,都将优雅地维护当前的安全标准。正如预期的那样,部署不会像其他提案那样受到来自浏览器供应商的标准化和协作的阻碍。
{"title":"HTTPSLock: Enforcing HTTPS in Unmodified Browsers with Cached Javascript","authors":"Adonis P. H. Fung, K. Cheung","doi":"10.1109/NSS.2010.84","DOIUrl":"https://doi.org/10.1109/NSS.2010.84","url":null,"abstract":"HTTPS is designed to protect a connection against eavesdropping and man-in-the-middle attacks. HTTPS is however often compromised and voided when users are to embrace invalid certificates or disregard if HTTPS is being used. The current HTTPS deployment relies on unsophisticated users to safeguard themselves by performing legitimacy judgment. We propose HTTPS Lock, a simple and immediate approach to enforce HTTPS security. HTTPS Lock can be deployed to a website with a valid certificate by simply including several Javascript and HTML files, which will be cached in browsers. Similar to the trust-on-first-use model used by SSH, the trusted code cached on the client-side can effectively enforce the use of HTTPS and forbid users to embrace invalid certificates for any compromised networks subsequently encountered. Over 72% of major web browsers are supported, and further growth is expected. In any situation where the protection is unsupported or expired, the current security standard is gracefully maintained. As desired, the deployment is not hindered by standardization and collaboration from browser vendors as with other proposals.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121847538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Identifying Legitimate Clients under Distributed Denial-of-Service Attacks 识别分布式拒绝服务攻击下的合法客户端
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.77
Steven Simpson, A. Lindsay, D. Hutchison
Distributed Denial of Service (DDoS) attacks are a persistent, current, and very real threat to networks. Expanding upon a flexible distributed framework for network remediation utilising multiple strategies, we examine a novel fusion of methods to maximise throughput from legitimate clients and minimise the impact from attackers. The basic approach is to build up a whitelist of likely legitimate clients by observing outgoing traffic, presenting a challenge though proof-of-work, and providing flow cookies. Traffic that does not match the expected profile is likely attack traffic, and can be heavily filtered during attack conditions. After we incrementally develop this approach, we explore the positive and negative impacts of this approach upon the network and analyse potential countermeasures.
分布式拒绝服务(DDoS)攻击是对网络的持久、当前和非常真实的威胁。利用多种策略扩展灵活的分布式网络修复框架,我们研究了一种新的方法融合,以最大限度地提高合法客户端的吞吐量,并最大限度地减少攻击者的影响。基本方法是通过观察出站流量,通过工作量证明提出挑战,并提供流量cookie,建立可能合法客户端的白名单。与预期配置文件不匹配的流量可能是攻击流量,在攻击条件下可以进行大量过滤。在我们逐步发展这种方法之后,我们探讨了这种方法对网络的积极和消极影响,并分析了潜在的对策。
{"title":"Identifying Legitimate Clients under Distributed Denial-of-Service Attacks","authors":"Steven Simpson, A. Lindsay, D. Hutchison","doi":"10.1109/NSS.2010.77","DOIUrl":"https://doi.org/10.1109/NSS.2010.77","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks are a persistent, current, and very real threat to networks. Expanding upon a flexible distributed framework for network remediation utilising multiple strategies, we examine a novel fusion of methods to maximise throughput from legitimate clients and minimise the impact from attackers. The basic approach is to build up a whitelist of likely legitimate clients by observing outgoing traffic, presenting a challenge though proof-of-work, and providing flow cookies. Traffic that does not match the expected profile is likely attack traffic, and can be heavily filtered during attack conditions. After we incrementally develop this approach, we explore the positive and negative impacts of this approach upon the network and analyse potential countermeasures.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122432419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Framework for Monitoring SIP Enterprise Networks 一个SIP企业网络监控框架
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.79
M. Nassar, R. State, O. Festor
In this paper we aim to enable security within SIP enterprise domains by providing monitoring capabilities at three levels: the network traffic, the server logs and the billing records. We propose an anomaly detection approach based on appropriate feature extraction and one-class Support Vector Machines (SVM). We propose methods for anomaly/attack type classification and attack source identification. Our approach is validated through experiments on a controlled test-bed using a customized normal traffic generation model and synthesized attacks. The results show promising performances in terms of accuracy, efficiency and usability.
在本文中,我们的目标是通过提供三个级别的监视功能来实现SIP企业域中的安全性:网络流量、服务器日志和计费记录。提出了一种基于特征提取和一类支持向量机(SVM)的异常检测方法。提出了异常/攻击类型分类和攻击源识别方法。我们的方法通过使用定制的正常流量生成模型和综合攻击在受控测试台上的实验进行了验证。结果表明,该方法在准确性、效率和可用性方面表现良好。
{"title":"A Framework for Monitoring SIP Enterprise Networks","authors":"M. Nassar, R. State, O. Festor","doi":"10.1109/NSS.2010.79","DOIUrl":"https://doi.org/10.1109/NSS.2010.79","url":null,"abstract":"In this paper we aim to enable security within SIP enterprise domains by providing monitoring capabilities at three levels: the network traffic, the server logs and the billing records. We propose an anomaly detection approach based on appropriate feature extraction and one-class Support Vector Machines (SVM). We propose methods for anomaly/attack type classification and attack source identification. Our approach is validated through experiments on a controlled test-bed using a customized normal traffic generation model and synthesized attacks. The results show promising performances in terms of accuracy, efficiency and usability.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126370993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Two-Step Mutual Authentication Protocol Based on Randomized Hash-Lock for Small RFID Networks 基于随机哈希锁的小型RFID网络两步互认证协议
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.30
Kaleb Lee
RFID has been widely used in today's commercial and supply chain industry, due to the significant advantages it offers and the relatively low production cost. However, this ubiquitous technology has inherent problems in security and privacy. This calls for the development of simple, efficient and cost effective mechanisms against a variety of security threats. This paper proposes a two-step authentication protocol based on the randomized hash-lock scheme proposed by S. Weis in 2003. By introducing additional measures during the authentication process, this new protocol proves to enhance the security of RFID significantly, and protects the passive tags from almost all major attacks, including tag cloning, replay, full-disclosure, tracking, and eavesdropping. Furthermore, no significant changes to the tags is required to implement this protocol, and the low complexity level of the randomized hash-lock algorithm is retained.
由于RFID提供的显著优势和相对较低的生产成本,它已广泛应用于当今的商业和供应链行业。然而,这种无处不在的技术在安全性和隐私性方面存在固有的问题。这就要求针对各种安全威胁制定简单、有效和具有成本效益的机制。本文在S. Weis 2003年提出的随机散列锁方案的基础上,提出了一种两步认证协议。通过在认证过程中引入额外的措施,该协议大大提高了RFID的安全性,并保护被动标签免受几乎所有主要攻击,包括标签克隆、重放、完全披露、跟踪和窃听。此外,实现该协议不需要对标签进行重大更改,并且保留了随机散列锁算法的低复杂度。
{"title":"A Two-Step Mutual Authentication Protocol Based on Randomized Hash-Lock for Small RFID Networks","authors":"Kaleb Lee","doi":"10.1109/NSS.2010.30","DOIUrl":"https://doi.org/10.1109/NSS.2010.30","url":null,"abstract":"RFID has been widely used in today's commercial and supply chain industry, due to the significant advantages it offers and the relatively low production cost. However, this ubiquitous technology has inherent problems in security and privacy. This calls for the development of simple, efficient and cost effective mechanisms against a variety of security threats. This paper proposes a two-step authentication protocol based on the randomized hash-lock scheme proposed by S. Weis in 2003. By introducing additional measures during the authentication process, this new protocol proves to enhance the security of RFID significantly, and protects the passive tags from almost all major attacks, including tag cloning, replay, full-disclosure, tracking, and eavesdropping. Furthermore, no significant changes to the tags is required to implement this protocol, and the low complexity level of the randomized hash-lock algorithm is retained.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127945258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Flexible and Efficient Alert Correlation Platform for Distributed IDS 一种灵活高效的分布式入侵检测系统报警关联平台
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.26
S. Roschke, Feng Cheng, C. Meinel
Intrusion Detection Systems (IDS) have been widely deployed in practice for detecting malicious behavior on network communication and hosts. The problem of false-positive alerts is a popular existing problem for most of IDS approaches. The solution to address this problem is correlation and clustering of alerts. To meet the practical requirements, this process needs to be finished as soon as possible, which is a challenging task as the amount of alerts produced in large scale deployments of distributed IDS is significantly high. We identify the data storage and processing algorithms to be the most important factors influencing the performance of clustering and correlation. We propose and implement the utilization of memory-supported algorithms and a column-oriented database for correlation and clustering in an extensible IDS correlation platform. The utilization of the column-oriented database, an In-Memory Alert Storage, and memory-based index tables leads to significant improvements on the performance. Different types of correlation modules can be integrated and compared on this platform. A plugin concept for Receivers provides flexible integration of various sensors and additional IDS management systems. The platform can be distributed over multiple processing units to share memory and processing power. A standardized interface is designed to provide a unified view of result reports for end users. The efficiency of the proposed platform is tested by practical experiments with several alert storage approaches, different simple algorithms, as well as local and distributed deployment.
入侵检测系统(IDS)用于检测网络通信和主机上的恶意行为,在实践中得到了广泛的应用。假阳性警报问题是大多数IDS方法普遍存在的问题。解决这个问题的解决方案是警报的相关性和聚类。为了满足实际需求,这个过程需要尽快完成,这是一项具有挑战性的任务,因为在大规模分布式IDS部署中产生的警报数量非常高。我们认为数据存储和处理算法是影响聚类和关联性能的最重要因素。在一个可扩展的IDS相关平台中,提出并实现了基于内存支持算法和面向列的数据库的相关和聚类。使用面向列的数据库、内存警报存储和基于内存的索引表可以显著提高性能。在该平台上,可以对不同类型的相关模块进行集成和比较。接收器的插件概念提供了各种传感器和附加IDS管理系统的灵活集成。该平台可以分布在多个处理单元上,以共享内存和处理能力。标准化接口的设计目的是为最终用户提供统一的结果报告视图。通过不同的告警存储方法、不同的简单算法、本地部署和分布式部署,验证了该平台的有效性。
{"title":"A Flexible and Efficient Alert Correlation Platform for Distributed IDS","authors":"S. Roschke, Feng Cheng, C. Meinel","doi":"10.1109/NSS.2010.26","DOIUrl":"https://doi.org/10.1109/NSS.2010.26","url":null,"abstract":"Intrusion Detection Systems (IDS) have been widely deployed in practice for detecting malicious behavior on network communication and hosts. The problem of false-positive alerts is a popular existing problem for most of IDS approaches. The solution to address this problem is correlation and clustering of alerts. To meet the practical requirements, this process needs to be finished as soon as possible, which is a challenging task as the amount of alerts produced in large scale deployments of distributed IDS is significantly high. We identify the data storage and processing algorithms to be the most important factors influencing the performance of clustering and correlation. We propose and implement the utilization of memory-supported algorithms and a column-oriented database for correlation and clustering in an extensible IDS correlation platform. The utilization of the column-oriented database, an In-Memory Alert Storage, and memory-based index tables leads to significant improvements on the performance. Different types of correlation modules can be integrated and compared on this platform. A plugin concept for Receivers provides flexible integration of various sensors and additional IDS management systems. The platform can be distributed over multiple processing units to share memory and processing power. A standardized interface is designed to provide a unified view of result reports for end users. The efficiency of the proposed platform is tested by practical experiments with several alert storage approaches, different simple algorithms, as well as local and distributed deployment.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116990845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
The Enablers and Implementation Model for Mobile KMS in Australian Healthcare 澳大利亚医疗保健中移动KMS的推动者和实施模型
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.22
Heng-Sheng Tsai, R. Gururajan
In this research project, the enablers in implementing mobile KMS in Australian regional healthcare will be investigated, and a validated framework and guidelines to assist healthcare in implementing mobile KMS will also be proposed with both qualitative and quantitative approaches. The outcomes for this study are expected to improve the understanding the enabling factors in implementing mobile KMS in Australian healthcare, as well as provide better guidelines for this process.
在这个研究项目中,将调查在澳大利亚区域医疗保健中实施移动KMS的推动者,并将提出一个有效的框架和指导方针,以帮助医疗保健实施移动KMS,同时采用定性和定量方法。本研究的结果有望提高对在澳大利亚医疗保健中实施移动KMS的使能因素的理解,并为这一过程提供更好的指导。
{"title":"The Enablers and Implementation Model for Mobile KMS in Australian Healthcare","authors":"Heng-Sheng Tsai, R. Gururajan","doi":"10.1109/NSS.2010.22","DOIUrl":"https://doi.org/10.1109/NSS.2010.22","url":null,"abstract":"In this research project, the enablers in implementing mobile KMS in Australian regional healthcare will be investigated, and a validated framework and guidelines to assist healthcare in implementing mobile KMS will also be proposed with both qualitative and quantitative approaches. The outcomes for this study are expected to improve the understanding the enabling factors in implementing mobile KMS in Australian healthcare, as well as provide better guidelines for this process.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132239152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2010 Fourth International Conference on Network and System Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1