首页 > 最新文献

2008 International Symposium on Electronic Commerce and Security最新文献

英文 中文
Message Substitute Attack on Concurrent Signatures Protocol and its Improvement 并发签名协议的消息替代攻击及其改进
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.214
Yaling Zhang, Xiaofeng Wang
At Eurocrypt 2004, the concept of concurrent signatures was introduced by Chen, Kudla and Paterson. Concurrent signatures contribute a novel approach for the traditional problem of fair exchange of signatures. In this paper a general attack named the message substitute attack to the existing concurrent signatures protocol is proposed. Under the message substitute attack there is no concurrent in the existing concurrent signatures protocols including perfect concurrent signatures (PCS) protocol proposed by Susilo et al and its improvement iPCS1 protocol proposed by Guilin Wang et al. To prevent the message substitute attack, an i2PCS1 protocol which is an improvement on iPCS1 protocol is proposed. Further more an i3PCS1 protocol which is another improvement on iPCS1 protocol is proposed, the distinct advantage of i3PCS1 protocol is that its keystones are not published by the initial signer Alice finally but by the matching signer Bob, so that the matching signer Bob has some advantage over the initial signer Alice, while in almost all previous concurrent signatures protocols the initial signer Alice has some advantage. So the i3PCS1 Protocol differs from the previous concurrent signatures protocols.
在2004年的Eurocrypt会议上,Chen、Kudla和Paterson提出了并发签名的概念。并发签名为解决签名公平交换的传统问题提供了一种新的方法。针对现有的并发签名协议,提出了一种通用的消息替代攻击方法。在消息替代攻击下,现有的并发签名协议不存在并发性,包括Susilo等人提出的完美并发签名(PCS)协议和Wang桂林等人提出的改进iPCS1协议。为了防止消息替代攻击,提出了对iPCS1协议进行改进的i2PCS1协议。i3PCS1协议是对iPCS1协议的又一改进,i3PCS1协议的明显优点是其密钥最终不是由初始签名者Alice发布,而是由匹配签名者Bob发布,因此匹配签名者Bob比初始签名者Alice有一定优势,而在之前几乎所有的并发签名协议中,初始签名者Alice都有一定优势。因此,i3PCS1协议不同于以前的并发签名协议。
{"title":"Message Substitute Attack on Concurrent Signatures Protocol and its Improvement","authors":"Yaling Zhang, Xiaofeng Wang","doi":"10.1109/ISECS.2008.214","DOIUrl":"https://doi.org/10.1109/ISECS.2008.214","url":null,"abstract":"At Eurocrypt 2004, the concept of concurrent signatures was introduced by Chen, Kudla and Paterson. Concurrent signatures contribute a novel approach for the traditional problem of fair exchange of signatures. In this paper a general attack named the message substitute attack to the existing concurrent signatures protocol is proposed. Under the message substitute attack there is no concurrent in the existing concurrent signatures protocols including perfect concurrent signatures (PCS) protocol proposed by Susilo et al and its improvement iPCS1 protocol proposed by Guilin Wang et al. To prevent the message substitute attack, an i2PCS1 protocol which is an improvement on iPCS1 protocol is proposed. Further more an i3PCS1 protocol which is another improvement on iPCS1 protocol is proposed, the distinct advantage of i3PCS1 protocol is that its keystones are not published by the initial signer Alice finally but by the matching signer Bob, so that the matching signer Bob has some advantage over the initial signer Alice, while in almost all previous concurrent signatures protocols the initial signer Alice has some advantage. So the i3PCS1 Protocol differs from the previous concurrent signatures protocols.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128506598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Algorithm of Obtaining Best Rules Based on Rough Set 基于粗糙集的最佳规则获取算法
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.14
Shulin Chen, Lei Wang
With the fast development of the technology in Database and Internet, excessive information has become a problem that decision makers engage in electronic commerce have to affront. This paper firstly establishes the decision table for excessive data, then reduces knowledge of the decision table, and obtains the best rules. This can reduce the redundancy of the data, and improve the efficiency of knowledge obtaining. Because of the high time complexity and spatial complexity the general algorithm has, this paper proposed a new algorithm based on analogical matrix, and carried out the algorithm. The practice proves that the algorithm can improve the efficiency of knowledge obtaining, and the rules is tidy and best.
随着数据库技术和Internet技术的快速发展,信息过剩已成为电子商务决策者不得不面对的问题。本文首先对过量数据建立决策表,然后对决策表的知识进行约简,得到最优规则。这样可以减少数据的冗余,提高知识获取的效率。针对一般算法具有较高的时间复杂度和空间复杂度的问题,本文提出了一种基于类比矩阵的新算法,并对该算法进行了实现。实践证明,该算法能提高知识获取的效率,且规则整洁、优化。
{"title":"The Algorithm of Obtaining Best Rules Based on Rough Set","authors":"Shulin Chen, Lei Wang","doi":"10.1109/ISECS.2008.14","DOIUrl":"https://doi.org/10.1109/ISECS.2008.14","url":null,"abstract":"With the fast development of the technology in Database and Internet, excessive information has become a problem that decision makers engage in electronic commerce have to affront. This paper firstly establishes the decision table for excessive data, then reduces knowledge of the decision table, and obtains the best rules. This can reduce the redundancy of the data, and improve the efficiency of knowledge obtaining. Because of the high time complexity and spatial complexity the general algorithm has, this paper proposed a new algorithm based on analogical matrix, and carried out the algorithm. The practice proves that the algorithm can improve the efficiency of knowledge obtaining, and the rules is tidy and best.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128091464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Key Technologies for Security Enhancing of Payment Gateway 增强支付网关安全性的关键技术
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.37
Xuewang Zhang, Linlin Wang
The secure payment gateway is necessary for ensuring the development of e-commerce. The breaking down of hash algorithm of MD5 and the like have imposed great potential security hazard on payment gateway. We have brought forward a kind of solution for enhancing the security of payment gateway and expounded the major key technique for security enhancing centering on the payment protocol which blends SSL and SET: optimize and realize AES algorithm and integrate it into SSL protocol, establish secure hash algorithm based on the optimized AES and integrate it into SSL protocol, design and implement security proxy and micro authority certificate (CA) system.
安全的支付网关是保证电子商务发展的必要条件。MD5等哈希算法的破解给支付网关带来了巨大的安全隐患。提出了一种增强支付网关安全性的解决方案,并围绕融合SSL和SET的支付协议阐述了增强安全的主要关键技术:优化实现AES算法并集成到SSL协议中;基于优化后的AES建立安全哈希算法并集成到SSL协议中;设计实现安全代理和微权威证书(CA)系统。
{"title":"Key Technologies for Security Enhancing of Payment Gateway","authors":"Xuewang Zhang, Linlin Wang","doi":"10.1109/ISECS.2008.37","DOIUrl":"https://doi.org/10.1109/ISECS.2008.37","url":null,"abstract":"The secure payment gateway is necessary for ensuring the development of e-commerce. The breaking down of hash algorithm of MD5 and the like have imposed great potential security hazard on payment gateway. We have brought forward a kind of solution for enhancing the security of payment gateway and expounded the major key technique for security enhancing centering on the payment protocol which blends SSL and SET: optimize and realize AES algorithm and integrate it into SSL protocol, establish secure hash algorithm based on the optimized AES and integrate it into SSL protocol, design and implement security proxy and micro authority certificate (CA) system.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125617213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Using Multilevel Correlation in a Unified Platform of Network Security Management: Design and Implementation 多层次关联在网络安全管理统一平台中的应用:设计与实现
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.85
Zheng Wu, Debao Xiao, Min Xiao, Xi Peng
Alert correlation is the method used to analyze the implicit relation among attacks so as to discover real threats. There already have been several proposals on alert correlation, such as the methods based on predefined knowledge and the methods need no predefined knowledge. But they all have their drawbacks. Generally, the predefined knowledge based methods have no ability to recognize unknown attacks, and the non predefined knowledge based methods lack the capability to analyze multistep attacks. This paper presents a multilevel correlation method used in the Unified Platform of Network Security Management (UPNSM). This method combines the two methods mentioned above together in analyzing multisource alerts. The goal is to pull out false positive, extract real threats and discover unknown attacks. Experiments show that our multilevel correlation modeling and deployment techniques are effective in achieving this goal.
预警关联是分析攻击之间的隐式关系,从而发现真实威胁的一种方法。目前已有几种基于预定义知识的预警关联方法和不需要预定义知识的预警关联方法。但它们都有缺点。通常,预定义的基于知识的方法无法识别未知攻击,而非预定义的基于知识的方法则缺乏多步骤攻击的分析能力。提出了一种应用于网络安全管理统一平台(UPNSM)的多级关联方法。该方法在分析多源警报时将上述两种方法结合在一起。目标是排除误报,提取真正的威胁并发现未知的攻击。实验表明,我们的多层相关建模和部署技术可以有效地实现这一目标。
{"title":"Using Multilevel Correlation in a Unified Platform of Network Security Management: Design and Implementation","authors":"Zheng Wu, Debao Xiao, Min Xiao, Xi Peng","doi":"10.1109/ISECS.2008.85","DOIUrl":"https://doi.org/10.1109/ISECS.2008.85","url":null,"abstract":"Alert correlation is the method used to analyze the implicit relation among attacks so as to discover real threats. There already have been several proposals on alert correlation, such as the methods based on predefined knowledge and the methods need no predefined knowledge. But they all have their drawbacks. Generally, the predefined knowledge based methods have no ability to recognize unknown attacks, and the non predefined knowledge based methods lack the capability to analyze multistep attacks. This paper presents a multilevel correlation method used in the Unified Platform of Network Security Management (UPNSM). This method combines the two methods mentioned above together in analyzing multisource alerts. The goal is to pull out false positive, extract real threats and discover unknown attacks. Experiments show that our multilevel correlation modeling and deployment techniques are effective in achieving this goal.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127089395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Distributed Electronic Authentication Scheme in E-Business System 电子商务系统中的分布式电子认证方案
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.125
Xinxia Song, Zhigang Chen
A distributed e-business authentication scheme based on conic curve is proposed. This scheme is composed of two parts, constructing license and validating license. Because the security of license is determined by private key, not the arithmetic itself, user can not construct new license by given license and the public key as long as the private key is not leaked. Since encoding and decoding over conic are easily implement on conic curves, it has enabled our scheme to greatly enhance efficiency. We also analyse its security. The entire process guarantees the security and reliability.
提出了一种基于二次曲线的分布式电子商务认证方案。该方案由两个部分组成:构建许可证和验证许可证。由于许可证的安全性是由私钥而不是算法本身决定的,所以只要私钥不泄露,用户就不能根据给定的许可证和公钥构造新的许可证。由于二次曲线上的编码和解码在二次曲线上很容易实现,使我们的方案大大提高了效率。并对其安全性进行了分析。整个过程保证了安全性和可靠性。
{"title":"A Distributed Electronic Authentication Scheme in E-Business System","authors":"Xinxia Song, Zhigang Chen","doi":"10.1109/ISECS.2008.125","DOIUrl":"https://doi.org/10.1109/ISECS.2008.125","url":null,"abstract":"A distributed e-business authentication scheme based on conic curve is proposed. This scheme is composed of two parts, constructing license and validating license. Because the security of license is determined by private key, not the arithmetic itself, user can not construct new license by given license and the public key as long as the private key is not leaked. Since encoding and decoding over conic are easily implement on conic curves, it has enabled our scheme to greatly enhance efficiency. We also analyse its security. The entire process guarantees the security and reliability.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127223143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on the Application of CSCW in Shipbuilding Industry CSCW在船舶工业中的应用研究
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.40
Qingying Zhang, Weihong Yue, Chengfang Wang
Shipbuilding is a typical complex system engineering and requires many different enterprises and plants to work cooperatively to strive for the maximum profit. Supported by the computer, information, and Internet technology etc., CSCW plays a very crucial role in the multi-team, multi-subject, multi-layer field. Therefore, CSCW is necessary to be applied into the shipbuilding industry according to the shipbuilding characters and market requirements. Firstly, a collaborative shipbuilding system is set up and analyzed in detail, and then a collaborative decision support system is built up in order to make operations fluent. In the end, a collaborative ship commerce system is constructed and discussed. The application of CSCW is evidently useful to improve the shipbuilding industry and enhance the enterprisepsilas competitive capability.
造船是一个典型的复杂系统工程,需要许多不同的企业和工厂协同工作,以争取最大的利润。在计算机、信息、互联网等技术的支持下,协同工作在多团队、多学科、多层次的领域中发挥着至关重要的作用。因此,根据造船业的特点和市场需求,有必要将集水轮机应用到造船业中。首先对协同造船系统进行了详细的构建和分析,然后建立了协同造船决策支持系统,使协同造船系统的操作更加流畅。最后,对船舶协同商务系统进行了构建和探讨。CSCW的应用对船舶工业的发展和企业竞争能力的提高具有明显的促进作用。
{"title":"Research on the Application of CSCW in Shipbuilding Industry","authors":"Qingying Zhang, Weihong Yue, Chengfang Wang","doi":"10.1109/ISECS.2008.40","DOIUrl":"https://doi.org/10.1109/ISECS.2008.40","url":null,"abstract":"Shipbuilding is a typical complex system engineering and requires many different enterprises and plants to work cooperatively to strive for the maximum profit. Supported by the computer, information, and Internet technology etc., CSCW plays a very crucial role in the multi-team, multi-subject, multi-layer field. Therefore, CSCW is necessary to be applied into the shipbuilding industry according to the shipbuilding characters and market requirements. Firstly, a collaborative shipbuilding system is set up and analyzed in detail, and then a collaborative decision support system is built up in order to make operations fluent. In the end, a collaborative ship commerce system is constructed and discussed. The application of CSCW is evidently useful to improve the shipbuilding industry and enhance the enterprisepsilas competitive capability.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114173712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ownership Motivation and Corporate Performance in IT Industry under the Wave of E-Commerce: An Empirical Study based on Chinese Public Companies 电子商务浪潮下IT行业股权激励与公司绩效——基于中国上市公司的实证研究
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.30
Qi Yue, Hailin Lan, Luan Jiang
The development of Internet generated the wave of E-Commerce, which can lead an expansion of IT industry. This paper focuses on the relationship between of ownership motivation and corporate performance in IT companies because the showing of low occupational stability of managers in IT industry. With an empirical research through all 99 IT companies from Shanghai and Shenzhen stock market as the sample data, this paper founded that the average managerial ownership is quite small and has no effect on corporate performance, but there is an U-curved relationship between the population ratio of managerial stockholder and corporate performance.
互联网的发展产生了电子商务的浪潮,电子商务可以带动信息技术产业的扩张。鉴于IT行业管理者职业稳定性较低的特点,本文主要研究IT企业的股权激励与公司绩效之间的关系。本文以沪深两市全部99家IT公司为样本数据进行实证研究,发现管理层平均持股比例很小,对公司绩效没有影响,但管理层持股比例与公司绩效呈u型关系。
{"title":"Ownership Motivation and Corporate Performance in IT Industry under the Wave of E-Commerce: An Empirical Study based on Chinese Public Companies","authors":"Qi Yue, Hailin Lan, Luan Jiang","doi":"10.1109/ISECS.2008.30","DOIUrl":"https://doi.org/10.1109/ISECS.2008.30","url":null,"abstract":"The development of Internet generated the wave of E-Commerce, which can lead an expansion of IT industry. This paper focuses on the relationship between of ownership motivation and corporate performance in IT companies because the showing of low occupational stability of managers in IT industry. With an empirical research through all 99 IT companies from Shanghai and Shenzhen stock market as the sample data, this paper founded that the average managerial ownership is quite small and has no effect on corporate performance, but there is an U-curved relationship between the population ratio of managerial stockholder and corporate performance.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120919198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System 基于两层贝叶斯网络的入侵检测系统异常检测模型
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.178
Huijuan Lu, Jianguo Chen, Wei Wei
An intrusion detection system (IDS) attempts to identify attacks by comparing collected data to predefined signatures known to be malicious (signature-based IDS) or to a model of legal behaviour (anomaly-based IDS). Anomaly-based approaches have the advantage of being able to detect previously unknown attacks, but they suffer from the difficulty of building robust models of acceptable behaviour which may result in a large number of false alarms. Two reasons for the large number of false alarms, caused by incorrect classification of events in current systems, one is the simplistic aggregation of model outputs inthe decision phase. The other reason is the lack of integration of additional information into the decision process. To mitigate these shortcomings, this paper proposes a two stratum Bayesian networks based anomaly detection and decision model for intrusion detection system. Bayesian networks improve the aggregation of outputs, such as empirical data and allow one to seamlessly incorporate additional information. Experimental results clearly demonstrate the efficiency of our approach to improve the accuracy of the intrusion detection and decision process in an anomaly based IDS.
入侵检测系统(IDS)试图通过将收集到的数据与已知的恶意预定义签名(基于签名的IDS)或合法行为模型(基于异常的IDS)进行比较来识别攻击。基于异常的方法的优点是能够检测到以前未知的攻击,但是它们在构建可接受行为的健壮模型方面存在困难,这可能导致大量的假警报。当前系统中错误的事件分类导致了大量的假警报,其中一个原因是决策阶段模型输出的简单聚合。另一个原因是缺乏将附加信息集成到决策过程中。针对这些不足,本文提出了一种基于两层贝叶斯网络的入侵检测系统异常检测和决策模型。贝叶斯网络改进了输出的聚合,例如经验数据,并允许人们无缝地合并其他信息。实验结果清楚地表明,我们的方法可以有效地提高基于异常的入侵检测和决策过程的准确性。
{"title":"Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System","authors":"Huijuan Lu, Jianguo Chen, Wei Wei","doi":"10.1109/ISECS.2008.178","DOIUrl":"https://doi.org/10.1109/ISECS.2008.178","url":null,"abstract":"An intrusion detection system (IDS) attempts to identify attacks by comparing collected data to predefined signatures known to be malicious (signature-based IDS) or to a model of legal behaviour (anomaly-based IDS). Anomaly-based approaches have the advantage of being able to detect previously unknown attacks, but they suffer from the difficulty of building robust models of acceptable behaviour which may result in a large number of false alarms. Two reasons for the large number of false alarms, caused by incorrect classification of events in current systems, one is the simplistic aggregation of model outputs inthe decision phase. The other reason is the lack of integration of additional information into the decision process. To mitigate these shortcomings, this paper proposes a two stratum Bayesian networks based anomaly detection and decision model for intrusion detection system. Bayesian networks improve the aggregation of outputs, such as empirical data and allow one to seamlessly incorporate additional information. Experimental results clearly demonstrate the efficiency of our approach to improve the accuracy of the intrusion detection and decision process in an anomaly based IDS.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126347601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An Anomaly Intrusion Detection Model Based on Limited Labeled Instances 基于有限标记实例的异常入侵检测模型
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.26
Shanqing Guo, Zhong-Hua Zhao
Unsupervised or supervised anomaly intrusion detection techniques have great utility with the context of network intrusion detection system. However, large amount of labeled attack instances used by supervised approaches are difficult to obtain. And this makes most existing supervised techniques hardly be implemented in the real world. Unsupervised methods are superior in their independency on prior knowledge, but it is also very difficult for these methods to achieve high detection rate as well as low false positive rate. In this paper, we proposed an anomaly intrusion detection model based on small labeled instances that outperform existing unsupervised methods with a detection performance very close to that of the supervised one. We evaluated our methods by conducting experiments with network records from the KDD CUP 1999 data set. The results showed that our algorithm is an efficient method in detecting both known and unknown attacks.
无监督或有监督异常入侵检测技术在网络入侵检测系统中有着广泛的应用。然而,监督方法所使用的大量标记攻击实例难以获得。这使得大多数现有的监督技术很难在现实世界中实现。无监督方法在对先验知识的独立性方面具有优势,但也很难达到高的检测率和低的误报率。在本文中,我们提出了一种基于小标记实例的异常入侵检测模型,该模型优于现有的无监督方法,并且检测性能非常接近有监督方法。我们通过对KDD CUP 1999数据集的网络记录进行实验来评估我们的方法。结果表明,该算法是一种有效的检测已知和未知攻击的方法。
{"title":"An Anomaly Intrusion Detection Model Based on Limited Labeled Instances","authors":"Shanqing Guo, Zhong-Hua Zhao","doi":"10.1109/ISECS.2008.26","DOIUrl":"https://doi.org/10.1109/ISECS.2008.26","url":null,"abstract":"Unsupervised or supervised anomaly intrusion detection techniques have great utility with the context of network intrusion detection system. However, large amount of labeled attack instances used by supervised approaches are difficult to obtain. And this makes most existing supervised techniques hardly be implemented in the real world. Unsupervised methods are superior in their independency on prior knowledge, but it is also very difficult for these methods to achieve high detection rate as well as low false positive rate. In this paper, we proposed an anomaly intrusion detection model based on small labeled instances that outperform existing unsupervised methods with a detection performance very close to that of the supervised one. We evaluated our methods by conducting experiments with network records from the KDD CUP 1999 data set. The results showed that our algorithm is an efficient method in detecting both known and unknown attacks.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129968894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Electronic Time Stamping Safety and Efficiency Optimize Technique Research 电子时间戳安全与效率优化技术研究
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.11
Hong-Jiao Ma, Yu Hua, Wei Guo
Chinese UniTrust TimeStamp Authority is a trusted and professional time stamping service institution that was constructed by National Time Service Center (NTSC) and UNITRUST in 2007. Application of trusted time stamping in e-commerce, e-government and digital intellectual property rights in China at present is introduced in this paper. The structure and design method of the digital time stamp service system are analyzed in detail. The method for improving security and optimize efficiency of trusted time stamping are discussed.
恒信国际时间戳认证机构是由国家时间服务中心(NTSC)和恒信国际于2007年共同组建的值得信赖的专业时间戳服务机构。本文介绍了可信时间戳技术在中国电子商务、电子政务和数字知识产权领域的应用现状。详细分析了数字时间戳服务系统的结构和设计方法。讨论了提高可信时间戳安全性和优化效率的方法。
{"title":"Electronic Time Stamping Safety and Efficiency Optimize Technique Research","authors":"Hong-Jiao Ma, Yu Hua, Wei Guo","doi":"10.1109/ISECS.2008.11","DOIUrl":"https://doi.org/10.1109/ISECS.2008.11","url":null,"abstract":"Chinese UniTrust TimeStamp Authority is a trusted and professional time stamping service institution that was constructed by National Time Service Center (NTSC) and UNITRUST in 2007. Application of trusted time stamping in e-commerce, e-government and digital intellectual property rights in China at present is introduced in this paper. The structure and design method of the digital time stamp service system are analyzed in detail. The method for improving security and optimize efficiency of trusted time stamping are discussed.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"411 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114048701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2008 International Symposium on Electronic Commerce and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1