首页 > 最新文献

2010 Fourth International Conference on Network and System Security最新文献

英文 中文
The Convergences of Multisplitting Parallel Methods for Non-Hermitian Positive Definite Systems 非厄米正定系统多重分裂并行方法的收敛性
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.29
Chuan-Long Wang, Yan-Ping Wang
We present the convergent splitting and convergent multi splitting for linear system of algebraic equations Ax=b when the coefficient matrix is a non-hermitian positive definite matrix. Furthermore, we also establish the comparison theorems of different splitting or multisplittings by numerical radius. Finally, we give an application to solve the complex linear system.
给出了当系数矩阵为非厄米正定矩阵时线性代数方程组Ax=b的收敛分裂和收敛多重分裂。此外,我们还建立了数值半径不同分裂或多重分裂的比较定理。最后给出了求解复杂线性系统的一个应用。
{"title":"The Convergences of Multisplitting Parallel Methods for Non-Hermitian Positive Definite Systems","authors":"Chuan-Long Wang, Yan-Ping Wang","doi":"10.1109/NSS.2010.29","DOIUrl":"https://doi.org/10.1109/NSS.2010.29","url":null,"abstract":"We present the convergent splitting and convergent multi splitting for linear system of algebraic equations Ax=b when the coefficient matrix is a non-hermitian positive definite matrix. Furthermore, we also establish the comparison theorems of different splitting or multisplittings by numerical radius. Finally, we give an application to solve the complex linear system.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133346631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Smoothing Evolutionary Algorithm with Circle Search for Global Optimization 一种全局优化的圆搜索平滑进化算法
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.92
Yuping Wang, Lei Fan
There are many global optimization problems arisen in various fields of applications. It is very important to design effective algorithms for these problems. However, one of the key drawbacks of the existing global optimization methods is that they are not easy to escape from the local optimal solutions and can not find the global optimal solution quickly. In order to escape from the local optimal solutions and find the global optimal solution fast, first, a smoothing function, which can flatten the landscape of the original function and eliminate all local optimal solutions which are no better than the best one found so far, is proposed. This can make the search of the global optimal solution much easier. Second, to cooperate the smoothing function, a tailor-made search scheme called circle search is presented, which can quickly jump out the flattened landscape and fall in a lower landscape quickly. Third, a better solution than the best one found so far can be found by local search. Fourth, a crossover operator is designed based on uniform design. Based on these, a smoothing evolutionary algorithm for global optimization is proposed. At last, the numerical simulations for eight high dimensional and very challenging standard benchmark problems are made. The performance of the proposed algorithm is compared with that of nine evolutionary algorithms published recently. The results indicate that the proposed algorithm is statistically sound and has better performance for these test functions.
在各个应用领域中都出现了许多全局优化问题。针对这些问题设计有效的算法是非常重要的。然而,现有全局优化方法的一个主要缺点是不容易脱离局部最优解,不能快速找到全局最优解。为了摆脱局部最优解的困扰,快速找到全局最优解,首先提出了一种平滑函数,该平滑函数可以使原函数的景观变平,并消除所有不优于目前最优解的局部最优解;这可以使全局最优解的搜索更容易。其次,为了配合平滑功能,提出了一种定制的搜索方案,称为圆搜索,该方案可以快速跳出平坦的景观,并快速落入较低的景观。第三,通过局部搜索可以找到比目前最好的解决方案更好的解决方案。第四,基于均匀设计设计了交叉算子。在此基础上,提出了一种全局优化的平滑进化算法。最后,对8个高维极具挑战性的标准基准问题进行了数值模拟。将该算法的性能与最近发表的九种进化算法进行了比较。结果表明,该算法在统计上是合理的,对这些测试函数具有较好的性能。
{"title":"A Smoothing Evolutionary Algorithm with Circle Search for Global Optimization","authors":"Yuping Wang, Lei Fan","doi":"10.1109/NSS.2010.92","DOIUrl":"https://doi.org/10.1109/NSS.2010.92","url":null,"abstract":"There are many global optimization problems arisen in various fields of applications. It is very important to design effective algorithms for these problems. However, one of the key drawbacks of the existing global optimization methods is that they are not easy to escape from the local optimal solutions and can not find the global optimal solution quickly. In order to escape from the local optimal solutions and find the global optimal solution fast, first, a smoothing function, which can flatten the landscape of the original function and eliminate all local optimal solutions which are no better than the best one found so far, is proposed. This can make the search of the global optimal solution much easier. Second, to cooperate the smoothing function, a tailor-made search scheme called circle search is presented, which can quickly jump out the flattened landscape and fall in a lower landscape quickly. Third, a better solution than the best one found so far can be found by local search. Fourth, a crossover operator is designed based on uniform design. Based on these, a smoothing evolutionary algorithm for global optimization is proposed. At last, the numerical simulations for eight high dimensional and very challenging standard benchmark problems are made. The performance of the proposed algorithm is compared with that of nine evolutionary algorithms published recently. The results indicate that the proposed algorithm is statistically sound and has better performance for these test functions.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121723087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
OntoPsic: Leveraging the Knowledge in the Treatment and Diagnosis of Telepsychiatry 主题:利用远程精神病学的治疗和诊断知识
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.33
F. C. Dias, R. Azevedo, C. Rodrigues, E. Galvão, Guilherme Ataíde Dias, Roberto Souto Maior de Barros
Mental illness has always been target of debate and criticism by the society (modern or ancient). Several problems and challenges regarding Psychiatry, Telepsychiatry specifically are found in literature. The lack of information and the fear of the unknown have long been seen as a barrier for people with mental illness as well as all those involved in the process, such as family and the medical team. In the past, the lack of knowledge led the society to adopt harsh punishment for the patients, under the pretext that the same were possessed by some supernatural force. In this context, the lack of a public, formal and standardized model regarding any sort of information about this field was and remains as the central problem. Therefore, this paper proposes the OntoPsic, a domain-ontology for psychiatry applied to Healthcare Information System to define a common vocabulary about mental illness and Telepsychiatry. Besides relying on this base of knowledge to assist all involved in the treatment of mental disorders, this article also describes the OntoConsult, a system for the deduction of facts to support the decision making. In order to motivate the use of OntoPsic, the article reviews some applications and some practical results with the ontology.
精神疾病一直是社会(现代或古代)争论和批评的对象。关于精神病学的几个问题和挑战,特别是在文献中发现的远程精神病学。长期以来,缺乏信息和对未知的恐惧一直被视为精神疾病患者以及所有参与这一过程的人(如家人和医疗团队)的障碍。在过去,由于缺乏知识导致社会对病人采取严厉的惩罚,借口是他们被某种超自然力量附身。在这种情况下,关于这一领域的任何类型的信息,缺乏一个公开的、正式的和标准化的模型,过去是,现在仍然是中心问题。因此,本文提出了一个应用于医疗保健信息系统的精神病学领域本体OntoPsic,以定义一个关于精神疾病和远程精神病学的通用词汇。除了依靠这一知识基础来帮助所有参与精神障碍治疗的人之外,本文还介绍了OntoConsult,这是一个推断事实以支持决策的系统。为了激励本体的使用,本文回顾了本体的一些应用和一些实际成果。
{"title":"OntoPsic: Leveraging the Knowledge in the Treatment and Diagnosis of Telepsychiatry","authors":"F. C. Dias, R. Azevedo, C. Rodrigues, E. Galvão, Guilherme Ataíde Dias, Roberto Souto Maior de Barros","doi":"10.1109/NSS.2010.33","DOIUrl":"https://doi.org/10.1109/NSS.2010.33","url":null,"abstract":"Mental illness has always been target of debate and criticism by the society (modern or ancient). Several problems and challenges regarding Psychiatry, Telepsychiatry specifically are found in literature. The lack of information and the fear of the unknown have long been seen as a barrier for people with mental illness as well as all those involved in the process, such as family and the medical team. In the past, the lack of knowledge led the society to adopt harsh punishment for the patients, under the pretext that the same were possessed by some supernatural force. In this context, the lack of a public, formal and standardized model regarding any sort of information about this field was and remains as the central problem. Therefore, this paper proposes the OntoPsic, a domain-ontology for psychiatry applied to Healthcare Information System to define a common vocabulary about mental illness and Telepsychiatry. Besides relying on this base of knowledge to assist all involved in the treatment of mental disorders, this article also describes the OntoConsult, a system for the deduction of facts to support the decision making. In order to motivate the use of OntoPsic, the article reviews some applications and some practical results with the ontology.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121536186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Credential Stealing Attacks in an Open Networked Environment 开放网络环境下的凭证窃取攻击分析
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.56
Aashis Sharma, Z. Kalbarczyk, R. Iyer, James Barlow
This paper analyses the forensic data on credential stealing incidents over a period of 5 years across 5000 machines monitored at the National Center for Supercomputing Applications at the University of Illinois. The analysis conducted is the first attempt in an open operational environment (i) to evaluate the intricacies of carrying out SSH-based credential stealing attacks, (ii) to highlight and quantify key characteristics of such attacks, and (iii) to provide the system level characterization of such incidents in terms of distribution of alerts and incident consequences
本文分析了伊利诺斯大学国家超级计算应用中心监测的5000台机器在5年期间的凭证窃取事件的取证数据。进行的分析是在开放操作环境中的第一次尝试(i)评估执行基于ssh的凭证窃取攻击的复杂性,(ii)突出和量化此类攻击的关键特征,以及(iii)根据警报分布和事件后果提供此类事件的系统级特征
{"title":"Analysis of Credential Stealing Attacks in an Open Networked Environment","authors":"Aashis Sharma, Z. Kalbarczyk, R. Iyer, James Barlow","doi":"10.1109/NSS.2010.56","DOIUrl":"https://doi.org/10.1109/NSS.2010.56","url":null,"abstract":"This paper analyses the forensic data on credential stealing incidents over a period of 5 years across 5000 machines monitored at the National Center for Supercomputing Applications at the University of Illinois. The analysis conducted is the first attempt in an open operational environment (i) to evaluate the intricacies of carrying out SSH-based credential stealing attacks, (ii) to highlight and quantify key characteristics of such attacks, and (iii) to provide the system level characterization of such incidents in terms of distribution of alerts and incident consequences","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117111795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
An Improved Wavelet Analysis Method for Detecting DDoS Attacks 一种改进的小波分析方法检测DDoS攻击
Pub Date : 2010-09-01 DOI: 10.1109/nss.2010.23
L. Lu, M. Huang, M. Orgun, Jiawan Zhang
Wavelet Analysis method is considered as one of the most efficient methods for detecting DDoS attacks. However, during the peak data communication hours with a large amount of data transactions, this method is required to collect too many samples that will greatly increase the computational complexity. Therefore, the real-time response time as well as the accuracy of attack detection becomes very low. To address the above problem, we propose a new DDoS detection method called Modified Wavelet Analysis method which is based on the existing Isomap algorithm and wavelet analysis. In the paper, we present our new model and algorithm for detecting DDoS attacks and demonstrate the reasons of why we enlarge the Hurst’s value of the self-similarity in our new approach. Finally we present an experimental evaluation to demonstrate that the proposed method is more efficient than the other traditional methods based on wavelet analysis.
小波分析方法被认为是检测DDoS攻击最有效的方法之一。但在数据通信高峰时段,数据事务量较大,该方法需要采集的样本过多,计算复杂度大大增加。因此,攻击检测的实时响应时间和准确性变得非常低。针对上述问题,本文提出了一种基于现有Isomap算法和小波分析的改进小波分析法。在本文中,我们提出了新的DDoS攻击检测模型和算法,并说明了为什么我们在新方法中扩大了自相似度的Hurst值。实验结果表明,该方法比传统的基于小波分析的方法更有效。
{"title":"An Improved Wavelet Analysis Method for Detecting DDoS Attacks","authors":"L. Lu, M. Huang, M. Orgun, Jiawan Zhang","doi":"10.1109/nss.2010.23","DOIUrl":"https://doi.org/10.1109/nss.2010.23","url":null,"abstract":"Wavelet Analysis method is considered as one of the most efficient methods for detecting DDoS attacks. However, during the peak data communication hours with a large amount of data transactions, this method is required to collect too many samples that will greatly increase the computational complexity. Therefore, the real-time response time as well as the accuracy of attack detection becomes very low. To address the above problem, we propose a new DDoS detection method called Modified Wavelet Analysis method which is based on the existing Isomap algorithm and wavelet analysis. In the paper, we present our new model and algorithm for detecting DDoS attacks and demonstrate the reasons of why we enlarge the Hurst’s value of the self-similarity in our new approach. Finally we present an experimental evaluation to demonstrate that the proposed method is more efficient than the other traditional methods based on wavelet analysis.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131315376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
RF-DNA Fingerprinting for Airport WiMax Communications Security 射频dna指纹识别技术用于机场WiMax通信安全
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.21
McKay D. Williams, Sheldon A. Munns, M. Temple, M. Mendenhall
Wireless communication security is addressed using device-specific RF-DNA fingerprints in a localized regional air monitor. The targeted application includes IEEE 802.16 WiMax-based airport communications such as being proposed by the Euro control and FAA organizations–concept validation is currently underway using the Aeronautical Mobile Airport Communications System (AeroMACS) network. Security enhancement via RF-DNA fingerprinting is motivated by earlier RF-DNA work using GMSK-based intra-cellular GSM signals and OFDM-based 802.11a peer-to-peer WiFi signals. The commonality that WiMax shares with these two existing communication systems, i.e., the cellular control structure of GSM and the multi-carrier OFDM modulation of 802.11a, suggests that RF-DNA fingerprinting may be effective for WiMax device discrimination. This is important given that WiMax shares some common features that may prove detrimental, to include bit-level authentication, privacy, and security mechanisms. It is reasonable to assume that these bit-level mechanisms will come under attack as ``hackers'' apply lessons learned from their previous successes. The contributions of this paper include: 1) the introduction of a Spectral Domain (SD) RF-DNA fingerprinting technique to augment previous Time Domain (TD) and Wavelet Domain (WD) techniques, and 2) a first look at AeroMACS physical waveform features and the potential applicability of RF-DNA fingerprinting using operationally collected signals.
无线通信安全是通过在局部区域空气监测仪中使用特定设备的RF-DNA指纹来解决的。目标应用包括基于IEEE 802.16 wimax的机场通信,如由欧洲控制中心和美国联邦航空局组织提出的,目前正在使用航空移动机场通信系统(AeroMACS)网络进行概念验证。通过射频dna指纹识别增强安全性的动机是早期使用基于gmsk的蜂窝内GSM信号和基于ofdm的802.11a点对点WiFi信号的射频dna工作。WiMax与这两种现有通信系统的共性,即GSM的蜂窝控制结构和802.11a的多载波OFDM调制,表明RF-DNA指纹识别可能对WiMax设备识别有效。这一点很重要,因为WiMax共享一些可能被证明有害的共同特性,包括位级身份验证、隐私和安全机制。我们可以合理地假设,这些位级机制将受到攻击,因为“黑客”将从他们以前的成功中吸取教训。本文的贡献包括:1)引入了频谱域(SD) RF-DNA指纹识别技术,以增强之前的时域(TD)和小波域(WD)技术;2)首次研究了AeroMACS物理波形特征,以及利用操作采集的信号进行RF-DNA指纹识别的潜在适用性。
{"title":"RF-DNA Fingerprinting for Airport WiMax Communications Security","authors":"McKay D. Williams, Sheldon A. Munns, M. Temple, M. Mendenhall","doi":"10.1109/NSS.2010.21","DOIUrl":"https://doi.org/10.1109/NSS.2010.21","url":null,"abstract":"Wireless communication security is addressed using device-specific RF-DNA fingerprints in a localized regional air monitor. The targeted application includes IEEE 802.16 WiMax-based airport communications such as being proposed by the Euro control and FAA organizations–concept validation is currently underway using the Aeronautical Mobile Airport Communications System (AeroMACS) network. Security enhancement via RF-DNA fingerprinting is motivated by earlier RF-DNA work using GMSK-based intra-cellular GSM signals and OFDM-based 802.11a peer-to-peer WiFi signals. The commonality that WiMax shares with these two existing communication systems, i.e., the cellular control structure of GSM and the multi-carrier OFDM modulation of 802.11a, suggests that RF-DNA fingerprinting may be effective for WiMax device discrimination. This is important given that WiMax shares some common features that may prove detrimental, to include bit-level authentication, privacy, and security mechanisms. It is reasonable to assume that these bit-level mechanisms will come under attack as ``hackers'' apply lessons learned from their previous successes. The contributions of this paper include: 1) the introduction of a Spectral Domain (SD) RF-DNA fingerprinting technique to augment previous Time Domain (TD) and Wavelet Domain (WD) techniques, and 2) a first look at AeroMACS physical waveform features and the potential applicability of RF-DNA fingerprinting using operationally collected signals.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126650800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Certificateless Proxy Signature and Its Extension to Blind Signature 无证书代理签名及其对盲签名的扩展
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.96
R. Tso, X. Yi
In this paper, a certificateless proxy signature scheme is introduced. The advantage of our scheme is that it can be extended into a certificateless proxy blind signature scheme very easily.
介绍了一种无证书代理签名方案。该方案的优点是可以很容易地扩展为无证书代理盲签名方案。
{"title":"Certificateless Proxy Signature and Its Extension to Blind Signature","authors":"R. Tso, X. Yi","doi":"10.1109/NSS.2010.96","DOIUrl":"https://doi.org/10.1109/NSS.2010.96","url":null,"abstract":"In this paper, a certificateless proxy signature scheme is introduced. The advantage of our scheme is that it can be extended into a certificateless proxy blind signature scheme very easily.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122933790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Information-Theoretic Detection of Masquerade Mimicry Attacks 伪装模仿攻击的信息论检测
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.55
J. Tapiador, J. A. Clark
In a masquerade attack, an adversary who has stolen a legitimate user's credentials attempts to impersonate him to carry out malicious actions. Automatic detection of such attacks is often undertaken constructing models of normal behaviour of each user and then measuring significant departures from them. One potential vulnerability of this approach is that anomaly detection algorithms are generally susceptible of being deceived. In this paper, we first investigate how a resourceful masquerader can successfully evade detection while still accomplishing his goals. We then propose an algorithm based on the Kullback-Leibler divergence which attempts to identify if a sufficiently anomalous attack is present within an apparently normal request. Our experimental results indicate that the proposed scheme achieves considerably better detection quality than adversarial-unaware approaches.
在假面具攻击中,窃取合法用户凭证的攻击者试图冒充他执行恶意操作。对此类攻击的自动检测通常是构建每个用户的正常行为模型,然后测量与它们的显著偏差。这种方法的一个潜在漏洞是异常检测算法通常容易被欺骗。在本文中,我们首先研究了一个足智多谋的伪装者如何成功地逃避检测,同时仍然完成他的目标。然后,我们提出了一种基于Kullback-Leibler散度的算法,该算法试图识别在明显正常的请求中是否存在足够异常的攻击。实验结果表明,该方法的检测质量明显优于非对抗检测方法。
{"title":"Information-Theoretic Detection of Masquerade Mimicry Attacks","authors":"J. Tapiador, J. A. Clark","doi":"10.1109/NSS.2010.55","DOIUrl":"https://doi.org/10.1109/NSS.2010.55","url":null,"abstract":"In a masquerade attack, an adversary who has stolen a legitimate user's credentials attempts to impersonate him to carry out malicious actions. Automatic detection of such attacks is often undertaken constructing models of normal behaviour of each user and then measuring significant departures from them. One potential vulnerability of this approach is that anomaly detection algorithms are generally susceptible of being deceived. In this paper, we first investigate how a resourceful masquerader can successfully evade detection while still accomplishing his goals. We then propose an algorithm based on the Kullback-Leibler divergence which attempts to identify if a sufficiently anomalous attack is present within an apparently normal request. Our experimental results indicate that the proposed scheme achieves considerably better detection quality than adversarial-unaware approaches.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121799202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Node-based Trust Management Scheme for Mobile Ad-Hoc Networks 基于节点的移动Ad-Hoc网络信任管理方案
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.67
Raihana Ferdous, V. Muthukkumarasamy, A. Sattar
The inherent freedom in self-organized mobile ad-hoc networks (MANETs) introduces challenges for trust management; particularly when nodes do not have any prior knowledge of each other. Furthermore in MANETs, the nodes themselves should be responsible for their own security. We propose a novel approach for trust management in MANETs that is based on the nodes’ own responsibility of building their trust level and node-level trust monitoring. The main contribution of this work is in the introduction of a Node based Trust Management (NTM) scheme in MANET based on the assumption that individual nodes are themselves responsible for their own trust level. We explore and develop the mathematical framework of trust in NTM. Finally, in this context, we demonstrate our scheme with notations, algorithms, analytical model and prove of its correctness.
自组织移动自组网(manet)固有的自由度给信任管理带来了挑战;特别是当节点彼此没有任何先验知识时。此外,在manet中,节点本身应该对自己的安全负责。本文提出了一种基于节点自身建立信任级别和节点级信任监控责任的manet信任管理新方法。这项工作的主要贡献是在MANET中引入了基于节点的信任管理(NTM)方案,该方案基于单个节点自己负责自己的信任级别的假设。我们探索并发展了NTM中信任的数学框架。最后,在此背景下,我们用符号、算法、解析模型来证明我们的方案,并证明了它的正确性。
{"title":"A Node-based Trust Management Scheme for Mobile Ad-Hoc Networks","authors":"Raihana Ferdous, V. Muthukkumarasamy, A. Sattar","doi":"10.1109/NSS.2010.67","DOIUrl":"https://doi.org/10.1109/NSS.2010.67","url":null,"abstract":"The inherent freedom in self-organized mobile ad-hoc networks (MANETs) introduces challenges for trust management; particularly when nodes do not have any prior knowledge of each other. Furthermore in MANETs, the nodes themselves should be responsible for their own security. We propose a novel approach for trust management in MANETs that is based on the nodes’ own responsibility of building their trust level and node-level trust monitoring. The main contribution of this work is in the introduction of a Node based Trust Management (NTM) scheme in MANET based on the assumption that individual nodes are themselves responsible for their own trust level. We explore and develop the mathematical framework of trust in NTM. Finally, in this context, we demonstrate our scheme with notations, algorithms, analytical model and prove of its correctness.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116950931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Computational Intelligence Utilisation in Simulation of Congestion Control in TCP/IP Edge Network 计算智能在TCP/IP边缘网络拥塞控制仿真中的应用
Pub Date : 2010-09-01 DOI: 10.1109/NSS.2010.43
Reginald Lal, A. Chiou
Network congestion in the heterogeneous Internet, which is connected by millions of asynchronous systems, poses a serious threat to communication and intermediate nodes that falls under its path. The primary cause of network congestion is that data in networks are overloaded and available resources are inadequate to contain such traffic loads. An enormous amount of proposed approach towards network congestion is based on conventional control methods in the form of mathematical and linear models. However, the explosive growth of the Internet, its traffic and diversification of network applications has limited conventional control mechanism from scaling up and providing an effective solution. Although conventional congestion methods improve the level of control, the vulnerability of linearisation and varying network parameters makes it difficult to provide an efficient solution. In this paper, the problem of congestion is addressed via exploring computational intelligence (CI) methodology and proposing a fuzzy inference engine for congestion control in network edge and bottleneck link environments. Furthermore, through extensive simulation experiments, the results demonstrate that the proposed CI method improves network edge performance during congestion prior to conventional control methods.
在由数百万异步系统连接的异构Internet中,网络拥塞对其路径下的通信和中间节点构成严重威胁。网络拥塞的主要原因是网络中的数据过载,而可用资源不足以容纳这样的流量负载。大量针对网络拥塞提出的方法是以数学和线性模型形式的传统控制方法为基础的。然而,互联网的爆炸式增长及其流量和网络应用的多样化限制了传统控制机制的规模扩大和提供有效的解决方案。尽管传统的拥塞方法提高了控制水平,但线性化和网络参数变化的脆弱性使其难以提供有效的解决方案。本文通过探索计算智能(CI)方法来解决拥塞问题,并提出了一个用于网络边缘和瓶颈链路环境中拥塞控制的模糊推理引擎。此外,通过大量的仿真实验,结果表明,所提出的CI方法比传统控制方法更能提高网络在拥塞时的边缘性能。
{"title":"Computational Intelligence Utilisation in Simulation of Congestion Control in TCP/IP Edge Network","authors":"Reginald Lal, A. Chiou","doi":"10.1109/NSS.2010.43","DOIUrl":"https://doi.org/10.1109/NSS.2010.43","url":null,"abstract":"Network congestion in the heterogeneous Internet, which is connected by millions of asynchronous systems, poses a serious threat to communication and intermediate nodes that falls under its path. The primary cause of network congestion is that data in networks are overloaded and available resources are inadequate to contain such traffic loads. An enormous amount of proposed approach towards network congestion is based on conventional control methods in the form of mathematical and linear models. However, the explosive growth of the Internet, its traffic and diversification of network applications has limited conventional control mechanism from scaling up and providing an effective solution. Although conventional congestion methods improve the level of control, the vulnerability of linearisation and varying network parameters makes it difficult to provide an efficient solution. In this paper, the problem of congestion is addressed via exploring computational intelligence (CI) methodology and proposing a fuzzy inference engine for congestion control in network edge and bottleneck link environments. Furthermore, through extensive simulation experiments, the results demonstrate that the proposed CI method improves network edge performance during congestion prior to conventional control methods.","PeriodicalId":127173,"journal":{"name":"2010 Fourth International Conference on Network and System Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115639198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2010 Fourth International Conference on Network and System Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1