Tianbo Lu, Jinyang Zhao, Lingling Zhao, Yang Li, Xiaoyan Zhang
Today, cyber physical systems (CPS) are ubiquitous in power networks, healthcare devices, transportation networks, industrial process and infrastructures. Security of cyber physical systems has become the utmost important concern in system design, implementation and research. For the past few years, researchers are focus their researches on different aspects of security of cyber physical systems. In this paper, we present a comprehensive review on up-to-now security research of cyber physical systems. We analyze main universities and institutes studying CPS security objectives.
{"title":"Security Objectives of Cyber Physical Systems","authors":"Tianbo Lu, Jinyang Zhao, Lingling Zhao, Yang Li, Xiaoyan Zhang","doi":"10.1109/SECTECH.2014.15","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.15","url":null,"abstract":"Today, cyber physical systems (CPS) are ubiquitous in power networks, healthcare devices, transportation networks, industrial process and infrastructures. Security of cyber physical systems has become the utmost important concern in system design, implementation and research. For the past few years, researchers are focus their researches on different aspects of security of cyber physical systems. In this paper, we present a comprehensive review on up-to-now security research of cyber physical systems. We analyze main universities and institutes studying CPS security objectives.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125587429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anonymous communication system has been hot topic in the field of information security, and attack techniques against anonymous systems are endless. This paper classifies and summarizes the study of attacks against anonymous communication system in recent years, including passive attacks and active attacks.
{"title":"An Analysis of Attacks against Anonymous Communication Networks","authors":"Tianbo Lu, Puxin Yao, Lingling Zhao, Yang Li, Feng Xie, Yamei Xia","doi":"10.1109/SECTECH.2014.17","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.17","url":null,"abstract":"Anonymous communication system has been hot topic in the field of information security, and attack techniques against anonymous systems are endless. This paper classifies and summarizes the study of attacks against anonymous communication system in recent years, including passive attacks and active attacks.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"114 24","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113946016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research aims at studying the recognition accuracy and execution time that are affected by different dimensionality reduction methods applied to the biometric image data. We comparatively study the fingerprint, face images, and handwritten signature data that are pre-processed with the two statistical based dimensionality reduction methods: principal component analysis (PCA) and linear discriminant analysis (LDA). The algorithm that has been used to train and recognize the images is support vector machine with linear and polynomial kernel functions. Experimental results showed that the application of LDA dimensionality reduction method before recognizing the image patterns with a linear kernel function of SVM is more accurate and takes less time than the recognition that did not use dimensionality reduction. LDA is a suitable technique for physiological biometrics, whereas PCA is appropriate for the behavioral biometrics. We also found out that only 1% of transformed dimensions is adequate for the accurate recognition of biometric image patterns.
{"title":"An Empirical Study of Dimensionality Reduction Methods for Biometric Recognition","authors":"Nittaya Kerdprasop, Ratiporn Chanklan, Anusara Hirunyawanakul, Kittisak Kerdprasop","doi":"10.1109/SECTECH.2014.14","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.14","url":null,"abstract":"This research aims at studying the recognition accuracy and execution time that are affected by different dimensionality reduction methods applied to the biometric image data. We comparatively study the fingerprint, face images, and handwritten signature data that are pre-processed with the two statistical based dimensionality reduction methods: principal component analysis (PCA) and linear discriminant analysis (LDA). The algorithm that has been used to train and recognize the images is support vector machine with linear and polynomial kernel functions. Experimental results showed that the application of LDA dimensionality reduction method before recognizing the image patterns with a linear kernel function of SVM is more accurate and takes less time than the recognition that did not use dimensionality reduction. LDA is a suitable technique for physiological biometrics, whereas PCA is appropriate for the behavioral biometrics. We also found out that only 1% of transformed dimensions is adequate for the accurate recognition of biometric image patterns.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128933942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Seung-hee Oh, Dae-Hee Seo, Byunggil Lee, Byung-ho Chung
In recent maritime communication, discussion for the maritime information exchange has been carried out continuously around the e-Navigation for environmental protection and safe navigation. However, it is the situation that is concentrated only in the service and a common data structure for maritime information sharing, security considerations is insufficient. In this paper, we analysis the security threats and vulnerabilities that can be generated in the e-Navigation environment and propose a mutual authentication method to provide reliable communication between ships of e-Navigation. In the proposed scheme, it assures the reliability with each other through mutual authentication before starting AIS communication between ships by utilizing the MMSI is a unique key of ship.
{"title":"Mutual Authentication between Ships in the E-Navigation Environment","authors":"Seung-hee Oh, Dae-Hee Seo, Byunggil Lee, Byung-ho Chung","doi":"10.1109/SECTECH.2014.11","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.11","url":null,"abstract":"In recent maritime communication, discussion for the maritime information exchange has been carried out continuously around the e-Navigation for environmental protection and safe navigation. However, it is the situation that is concentrated only in the service and a common data structure for maritime information sharing, security considerations is insufficient. In this paper, we analysis the security threats and vulnerabilities that can be generated in the e-Navigation environment and propose a mutual authentication method to provide reliable communication between ships of e-Navigation. In the proposed scheme, it assures the reliability with each other through mutual authentication before starting AIS communication between ships by utilizing the MMSI is a unique key of ship.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122445246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Port hopping is a typical moving target defense, which constantly changes service port number to thwart reconnaissance attack. It is effective in hiding service identities and confusing potential attackers, but it is still unknown how effective port hopping is and under what circumstances it is a viable proactive defense because the existed works are limited and they usually discuss only a few parameters and give some empirical studies. This paper introduces urn model and quantifies the likelihood of attacker success in terms of the port pool size, number of probes, number of vulnerable services, and hopping frequency. Theoretical analysis shows that port hopping is an effective and promising proactive defense technology in thwarting network attacks.
{"title":"Effectiveness of Port Hopping as a Moving Target Defense","authors":"Yue Luo, Baosheng Wang, Gui-lin Cai","doi":"10.1109/SECTECH.2014.9","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.9","url":null,"abstract":"Port hopping is a typical moving target defense, which constantly changes service port number to thwart reconnaissance attack. It is effective in hiding service identities and confusing potential attackers, but it is still unknown how effective port hopping is and under what circumstances it is a viable proactive defense because the existed works are limited and they usually discuss only a few parameters and give some empirical studies. This paper introduces urn model and quantifies the likelihood of attacker success in terms of the port pool size, number of probes, number of vulnerable services, and hopping frequency. Theoretical analysis shows that port hopping is an effective and promising proactive defense technology in thwarting network attacks.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125909649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we extend the concept of Advanced Evasion Techniques (AETs) by exploring new alternatives to reduce the complexity of existing evasion tools. The major objective is to enhance the security testing potential brought by AETs by increasing the number of combinations that can be tested and checked on the Device Under Test (DUT). We analyze the performance of non-exhaustive search strategies by the use of clusters where multiple evasion techniques are combined. To this end, we propose the use of probabilistic trees to design scenario-based AETs where multiple architectures are considered. For an accurate analysis of the contribution resulting from the proposed idea, we illustrate our idea using a practical evasion tool, namely the EVADER tool designed by McAfee.
{"title":"Extending Advanced Evasion Techniques Using Combinatorial Search","authors":"M'hamed Chammem, Mohamed Hamdi, Tai-hoon Kim","doi":"10.1109/SECTECH.2014.18","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.18","url":null,"abstract":"In this paper, we extend the concept of Advanced Evasion Techniques (AETs) by exploring new alternatives to reduce the complexity of existing evasion tools. The major objective is to enhance the security testing potential brought by AETs by increasing the number of combinations that can be tested and checked on the Device Under Test (DUT). We analyze the performance of non-exhaustive search strategies by the use of clusters where multiple evasion techniques are combined. To this end, we propose the use of probabilistic trees to design scenario-based AETs where multiple architectures are considered. For an accurate analysis of the contribution resulting from the proposed idea, we illustrate our idea using a practical evasion tool, namely the EVADER tool designed by McAfee.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123024971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tianbo Lu, Xiaobo Guo, Lingling Zhao, Yang Li, Peng Lin
The study of security models for sensitive information systems has been taken on for years. During this century, the thought of seeking the system security to the source of system development lifecycle received huge improvement in the system and software assurance domain. This paper expounds the understanding of information security by illustrating information security study development progress since pre-computer age and presents a description of cyberspace and cyberization security by summarizing the status quo of cyberization. Then a security model called PDRL, which includes six core security attributes of sensitive information systems, is proposed to protect the security of sensitive information systems in the whole system life-cycle.
{"title":"An Analysis of Sensitive Information System Security Models","authors":"Tianbo Lu, Xiaobo Guo, Lingling Zhao, Yang Li, Peng Lin","doi":"10.1109/SECTECH.2014.13","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.13","url":null,"abstract":"The study of security models for sensitive information systems has been taken on for years. During this century, the thought of seeking the system security to the source of system development lifecycle received huge improvement in the system and software assurance domain. This paper expounds the understanding of information security by illustrating information security study development progress since pre-computer age and presents a description of cyberspace and cyberization security by summarizing the status quo of cyberization. Then a security model called PDRL, which includes six core security attributes of sensitive information systems, is proposed to protect the security of sensitive information systems in the whole system life-cycle.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129852984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tianbo Lu, Jiaxi Lin, Lingling Zhao, Yang Li, Yong Peng
Governments, companies, universities and research institutes are pushing the research and development of cyber-physical systems (CPS). However, the development of cyber-physical systems is constrained by security factors. According to this situation, this paper describes CPS security properties and basic theories, summarizes security attacks to cyber-physical systems as a theoretical reference for the study of cyber - physical systems and to provide useful security defense.
{"title":"An Analysis of Cyber Physical System Security Theories","authors":"Tianbo Lu, Jiaxi Lin, Lingling Zhao, Yang Li, Yong Peng","doi":"10.1109/SECTECH.2014.12","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.12","url":null,"abstract":"Governments, companies, universities and research institutes are pushing the research and development of cyber-physical systems (CPS). However, the development of cyber-physical systems is constrained by security factors. According to this situation, this paper describes CPS security properties and basic theories, summarizes security attacks to cyber-physical systems as a theoretical reference for the study of cyber - physical systems and to provide useful security defense.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127474531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Location tracking applications are usually based on exact GPS location information and non-anonymized WiFi Access Point (AP) information. It has been assumed that anonymizing WiFi AP information is an effective way to preserve location privacy of the connected users. In this work, our goal is to show that the privacy of connected users' movement pattern can still be compromised by a determined attacker even if the WiFi AP information is anonymized. We investigated the feasibility of tracking user's movement between locations from anonymized WiFi AP BSSIDs based on large Device Analyzer datasets. Our experiments show that the user's daily movement pattern can be identified with almost 83% accuracy.
位置跟踪应用程序通常基于精确的GPS位置信息和非匿名的WiFi接入点(AP)信息。人们一直认为匿名化WiFi AP信息是保护连接用户位置隐私的有效方法。在这项工作中,我们的目标是表明,即使WiFi AP信息是匿名的,连接用户的移动模式的隐私仍然可以被确定的攻击者破坏。我们研究了基于大型设备分析器数据集的匿名WiFi AP bssid跟踪用户在不同位置之间移动的可行性。我们的实验表明,用户的日常运动模式可以识别几乎83%的准确率。
{"title":"Determining Location and Movement Pattern Using Anonymized WiFi Access Point BSSID","authors":"M. N. Sakib, Junaed Bin Halim, Chin-Tser Huang","doi":"10.1109/SECTECH.2014.10","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.10","url":null,"abstract":"Location tracking applications are usually based on exact GPS location information and non-anonymized WiFi Access Point (AP) information. It has been assumed that anonymizing WiFi AP information is an effective way to preserve location privacy of the connected users. In this work, our goal is to show that the privacy of connected users' movement pattern can still be compromised by a determined attacker even if the WiFi AP information is anonymized. We investigated the feasibility of tracking user's movement between locations from anonymized WiFi AP BSSIDs based on large Device Analyzer datasets. Our experiments show that the user's daily movement pattern can be identified with almost 83% accuracy.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129913719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing aids users to outsource their data in the cloud remotely to prevent them from burdens of local storage and maintenance. Users no longer have possession and control of these data. This property brings many new security challenges like unauthorised entities and correctness of stored data. In this paper, we focus on the problem of ensuring the integrity of data stored in the cloud. We propose a method which combines biometric and cryptography techniques in a cost-effective manner for data owners to gain trust in the cloud. We present efficient and secure integrity based on the XOR operation and iris feature extraction as the strong factors. This work gives the cloud user more confidence in detecting any block that has been changed. Additionally, our proposed scheme employs user's iris features to secure and integrate data in a manner difficult for any internal or external entity to take or compromise it. Extensive security and performance analysis show that our scheme is highly efficient and provably secure.
{"title":"Secure and Efficient Data Integrity Based on Iris Features in Cloud Computing","authors":"Salah H. Abbdal, Hai Jin, Deqing Zou, A. Yassin","doi":"10.1109/SECTECH.2014.8","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.8","url":null,"abstract":"Cloud computing aids users to outsource their data in the cloud remotely to prevent them from burdens of local storage and maintenance. Users no longer have possession and control of these data. This property brings many new security challenges like unauthorised entities and correctness of stored data. In this paper, we focus on the problem of ensuring the integrity of data stored in the cloud. We propose a method which combines biometric and cryptography techniques in a cost-effective manner for data owners to gain trust in the cloud. We present efficient and secure integrity based on the XOR operation and iris feature extraction as the strong factors. This work gives the cloud user more confidence in detecting any block that has been changed. Additionally, our proposed scheme employs user's iris features to secure and integrate data in a manner difficult for any internal or external entity to take or compromise it. Extensive security and performance analysis show that our scheme is highly efficient and provably secure.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123297781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}