首页 > 最新文献

2009 Fourth International Conference on Internet Monitoring and Protection最新文献

英文 中文
Extraction of Parameters from Well Managed Networked System in Access Control 访问控制中管理良好的网络系统参数提取
Pub Date : 2009-05-24 DOI: 10.1109/ICIMP.2009.17
Akira Kanaoka, M. Katoh, Nobukatsu Toudou, E. Okamoto
Designing a networked system (NS), which consists of various network equipments and uses LAN technology, has become increasingly important. However, there have been few studies on NS design. Our previous study suggests that a well managed NS from an access control viewpoint has a fixed degree distribution, regardless of connection restriction. In this paper, we find an approximation function of its distribution using Genetic Algorithm. Found parameters show a well approximation result in all type of networked system. Furthermore, we propose a new measurement method for a well managed NS in access control using found parameters.
设计一个由各种网络设备组成并采用局域网技术的网络系统已经变得越来越重要。然而,关于NS设计的研究却很少。我们之前的研究表明,从访问控制的角度来看,一个管理良好的网络具有固定的度分布,而不考虑连接限制。本文用遗传算法求出其分布的近似函数。所得到的参数在所有类型的网络系统中都有很好的近似结果。此外,我们还提出了一种利用已发现的参数测量访问控制中管理良好的NS的新方法。
{"title":"Extraction of Parameters from Well Managed Networked System in Access Control","authors":"Akira Kanaoka, M. Katoh, Nobukatsu Toudou, E. Okamoto","doi":"10.1109/ICIMP.2009.17","DOIUrl":"https://doi.org/10.1109/ICIMP.2009.17","url":null,"abstract":"Designing a networked system (NS), which consists of various network equipments and uses LAN technology, has become increasingly important. However, there have been few studies on NS design. Our previous study suggests that a well managed NS from an access control viewpoint has a fixed degree distribution, regardless of connection restriction. In this paper, we find an approximation function of its distribution using Genetic Algorithm. Found parameters show a well approximation result in all type of networked system. Furthermore, we propose a new measurement method for a well managed NS in access control using found parameters.","PeriodicalId":165157,"journal":{"name":"2009 Fourth International Conference on Internet Monitoring and Protection","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116101829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Behavior-Based Proactive Detection of Unknown Malicious Codes 基于行为的未知恶意代码的主动检测
Pub Date : 2009-05-24 DOI: 10.1109/ICIMP.2009.20
Jianguo Ding, Jian Jin, P. Bouvry, Yongtao Hu, Haibing Guan
With the rising popularity of the Internet, the resulting increase in the number of available vulnerable machines, and the elevated sophistication of the malicious code itself, the detection and prevention of unknown malicious codes meet great challenges. Traditional anti-virus scanner employs static features to detect malicious executable codes and is hard to detect the unknown malicious codes effectively. We propose behavior-based dynamic heuristic analysis approach for proactive detection of unknown malicious codes. The behavior of malicious codes is identified by system calling through virtual emulation and the changes in system resources. A statistical detection model and mixture of expert (MoE) model are designed to analyze the behavior of malicious codes. The experiment results demonstrate the behavior-based proactive detection is efficient in detecting unknown malicious executable codes.
随着Internet的日益普及,可用的易受攻击机器数量的增加,以及恶意代码本身的复杂性的提高,对未知恶意代码的检测和预防面临着巨大的挑战。传统的防病毒扫描程序采用静态特征检测恶意可执行代码,难以有效检测未知恶意代码。提出了一种基于行为的动态启发式分析方法,用于主动检测未知恶意代码。通过虚拟仿真和系统资源的变化来识别恶意代码的行为。设计了统计检测模型和混合专家(MoE)模型来分析恶意代码的行为。实验结果表明,基于行为的主动检测在检测未知恶意可执行代码方面是有效的。
{"title":"Behavior-Based Proactive Detection of Unknown Malicious Codes","authors":"Jianguo Ding, Jian Jin, P. Bouvry, Yongtao Hu, Haibing Guan","doi":"10.1109/ICIMP.2009.20","DOIUrl":"https://doi.org/10.1109/ICIMP.2009.20","url":null,"abstract":"With the rising popularity of the Internet, the resulting increase in the number of available vulnerable machines, and the elevated sophistication of the malicious code itself, the detection and prevention of unknown malicious codes meet great challenges. Traditional anti-virus scanner employs static features to detect malicious executable codes and is hard to detect the unknown malicious codes effectively. We propose behavior-based dynamic heuristic analysis approach for proactive detection of unknown malicious codes. The behavior of malicious codes is identified by system calling through virtual emulation and the changes in system resources. A statistical detection model and mixture of expert (MoE) model are designed to analyze the behavior of malicious codes. The experiment results demonstrate the behavior-based proactive detection is efficient in detecting unknown malicious executable codes.","PeriodicalId":165157,"journal":{"name":"2009 Fourth International Conference on Internet Monitoring and Protection","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121721272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Domain Based Content Sharing in Digital Home 数字家庭中基于域的内容共享
Pub Date : 2009-05-24 DOI: 10.1109/ICIMP.2009.18
Jungsoo Lee, Junghyun Kim, Jihyun Park, K. Yoon
DRM(Digital Rights Management) and CAS (Conditional Access System) techniques have been used to cut off the illegal use of contents. These techniques, however, brought about much inconvenience as restricting the move or play of the contents of even legal users. In this paper, we propose a new technique for sharing DRM contents based on domain according to the increment of the demand about the pliant use and share of the contents in digital home. The proposed scheme can prevent contents being flowed out and cut off the illegal use as describing domain license in the extent of DRM license.
DRM(数字版权管理)和CAS(条件访问系统)技术已被用来切断非法使用的内容。然而,这些技术带来了许多不便,因为即使是合法用户也限制了内容的移动或播放。本文针对数字家庭中内容柔性使用和共享需求的增长,提出了一种基于域的DRM内容共享技术。该方案可以在DRM许可范围内防止内容外泄,并切断描述域许可的非法使用。
{"title":"Domain Based Content Sharing in Digital Home","authors":"Jungsoo Lee, Junghyun Kim, Jihyun Park, K. Yoon","doi":"10.1109/ICIMP.2009.18","DOIUrl":"https://doi.org/10.1109/ICIMP.2009.18","url":null,"abstract":"DRM(Digital Rights Management) and CAS (Conditional Access System) techniques have been used to cut off the illegal use of contents. These techniques, however, brought about much inconvenience as restricting the move or play of the contents of even legal users. In this paper, we propose a new technique for sharing DRM contents based on domain according to the increment of the demand about the pliant use and share of the contents in digital home. The proposed scheme can prevent contents being flowed out and cut off the illegal use as describing domain license in the extent of DRM license.","PeriodicalId":165157,"journal":{"name":"2009 Fourth International Conference on Internet Monitoring and Protection","volume":"12 1-3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131491775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security in Peer-to-Peer Networks: Empiric Model of File Diffusion in BitTorrent 点对点网络中的安全性:BitTorrent中文件扩散的经验模型
Pub Date : 2009-05-24 DOI: 10.1109/ICIMP.2009.14
J. Schäfer, K. Malinka
In this work we analyze propagation of files in the BitTorrent network. The paper covers security problems in peer-to-peer networks and establishes a malware propagation model. We give overview of existing models and their weaknesses and introduce a propagation or epidemiological model based on model based on real data and real user behavior in the peer-to-peer network BitTorrent. We describe our empirical epidemiological model in detail and propose some advanced strategies which can help in fight against malware. Further we present our empiric, as its application.
在这项工作中,我们分析了文件在BitTorrent网络中的传播。本文讨论了点对点网络中的安全问题,建立了恶意软件的传播模型。我们概述了现有模型及其不足,并介绍了基于点对点网络BitTorrent中真实数据和真实用户行为的模型的传播或流行病学模型。我们详细描述了我们的经验流行病学模型,并提出了一些先进的策略,可以帮助对抗恶意软件。进一步,我们提出了我们的经验,作为它的应用。
{"title":"Security in Peer-to-Peer Networks: Empiric Model of File Diffusion in BitTorrent","authors":"J. Schäfer, K. Malinka","doi":"10.1109/ICIMP.2009.14","DOIUrl":"https://doi.org/10.1109/ICIMP.2009.14","url":null,"abstract":"In this work we analyze propagation of files in the BitTorrent network. The paper covers security problems in peer-to-peer networks and establishes a malware propagation model. We give overview of existing models and their weaknesses and introduce a propagation or epidemiological model based on model based on real data and real user behavior in the peer-to-peer network BitTorrent. We describe our empirical epidemiological model in detail and propose some advanced strategies which can help in fight against malware. Further we present our empiric, as its application.","PeriodicalId":165157,"journal":{"name":"2009 Fourth International Conference on Internet Monitoring and Protection","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121551023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Usability of Visual Evoked Potentials as Behavioral Characteristics for Biometric Authentication 视觉诱发电位作为生物识别认证行为特征的可用性
Pub Date : 2009-05-24 DOI: 10.1109/ICIMP.2009.22
K. Malinka
Biometric authentication methods are one of three approaches currently used. They offer a lot of benefits as well as they have few disadvantages. One of these disadvantages is low level of flexibility. It’s not possible to change your biometric characteristic or even to increase number of your characteristics. This could be problem if we consider many systems with different level of security. Corruption of system with low level of security could help attacker to gain access to system with higher level of security. Solution of this problem could lie in use of behavioral biometric. The article introduces challenge-response approach in this area. We discuss possibilities of challenge-response biometric authentication and show new behavioral biometric suitable for this approach – visual evoked potentials. We give description of physiological features of this characteristic, discuss this properties and usability. We try to answer the question if it’s suitable only for liveness testing or it’s possible to use it for full authentication. Further we present design of prototype challenge-response biometric authentication system which takes advantage of visual evoked potentials.
生物识别认证方法是目前使用的三种方法之一。它们提供了很多好处,也有一些缺点。其中一个缺点是灵活性较低。改变生物特征是不可能的,甚至增加特征的数量也是不可能的。如果我们考虑许多具有不同安全级别的系统,这可能是一个问题。低安全级别系统的破坏可以帮助攻击者访问更高安全级别的系统。这个问题的解决方案可能在于使用行为生物识别技术。本文介绍了这一领域的挑战-响应方法。我们讨论了挑战-反应生物识别认证的可能性,并展示了适合这种方法的新的行为生物识别-视觉诱发电位。对该特性的生理特征进行了描述,并对其特性和可用性进行了讨论。我们试图回答这样一个问题:它是否只适合活体测试,还是有可能用于完整的认证。在此基础上,我们设计了一种基于视觉诱发电位的挑战-反应生物识别认证系统原型。
{"title":"Usability of Visual Evoked Potentials as Behavioral Characteristics for Biometric Authentication","authors":"K. Malinka","doi":"10.1109/ICIMP.2009.22","DOIUrl":"https://doi.org/10.1109/ICIMP.2009.22","url":null,"abstract":"Biometric authentication methods are one of three approaches currently used. They offer a lot of benefits as well as they have few disadvantages. One of these disadvantages is low level of flexibility. It’s not possible to change your biometric characteristic or even to increase number of your characteristics. This could be problem if we consider many systems with different level of security. Corruption of system with low level of security could help attacker to gain access to system with higher level of security. Solution of this problem could lie in use of behavioral biometric. The article introduces challenge-response approach in this area. We discuss possibilities of challenge-response biometric authentication and show new behavioral biometric suitable for this approach – visual evoked potentials. We give description of physiological features of this characteristic, discuss this properties and usability. We try to answer the question if it’s suitable only for liveness testing or it’s possible to use it for full authentication. Further we present design of prototype challenge-response biometric authentication system which takes advantage of visual evoked potentials.","PeriodicalId":165157,"journal":{"name":"2009 Fourth International Conference on Internet Monitoring and Protection","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114644148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Framework for Zombie Detection Using Neural Networks 基于神经网络的僵尸检测框架
Pub Date : 2009-05-24 DOI: 10.1109/ICIMP.2009.10
P. Salvador, A. Nogueira, Ulisses França, R. Valadas
One of the most important threats to personal and corporate Internet security is the proliferation of Zombie PCs operating as an organized network. Zombie detection is currently performed at the host level and/or network level, but these options have some important drawbacks: antivirus, anti-spyware and personal firewalls are ineffective in the detection of hosts that are compromised via new or target-specific malicious software, while network firewalls and Intrusion Detection Systems were developed to protect the network from external attacks but they were not designed to detect and protect against vulnerabilities that are already present inside the local area network. This paper presents a new approach, based on neural networks, that is able to detect Zombie PCs based on the historical traffic profiles presented by "licit" and "illicit" network applications. The evaluation of the proposed methodology relies on traffic traces obtained in a controlled environment and composed by licit traffic measured from normal activity of network applications and malicious traffic synthetically generated using the SubSeven backdoor. The results obtained show that the proposed methodology is able to achieve good identification results, being at the same time computationally efficient and easy to deploy in real network scenarios.
对个人和企业互联网安全最重要的威胁之一是僵尸电脑作为一个有组织的网络进行操作的扩散。僵尸检测目前在主机级和/或网络级执行,但这些选项有一些重要的缺点:反病毒、反间谍软件和个人防火墙在检测被新的或特定目标的恶意软件破坏的主机方面是无效的,而网络防火墙和入侵检测系统是为了保护网络免受外部攻击而开发的,但它们不是为了检测和保护局域网内已经存在的漏洞而设计的。本文提出了一种基于神经网络的新方法,该方法能够根据“合法”和“非法”网络应用程序呈现的历史流量概况来检测僵尸pc。所提出的方法的评估依赖于在受控环境中获得的流量轨迹,由从网络应用程序的正常活动中测量的合法流量和使用SubSeven后门合成的恶意流量组成。结果表明,该方法具有较好的识别效果,同时具有计算效率高、易于在实际网络场景中部署的特点。
{"title":"Framework for Zombie Detection Using Neural Networks","authors":"P. Salvador, A. Nogueira, Ulisses França, R. Valadas","doi":"10.1109/ICIMP.2009.10","DOIUrl":"https://doi.org/10.1109/ICIMP.2009.10","url":null,"abstract":"One of the most important threats to personal and corporate Internet security is the proliferation of Zombie PCs operating as an organized network. Zombie detection is currently performed at the host level and/or network level, but these options have some important drawbacks: antivirus, anti-spyware and personal firewalls are ineffective in the detection of hosts that are compromised via new or target-specific malicious software, while network firewalls and Intrusion Detection Systems were developed to protect the network from external attacks but they were not designed to detect and protect against vulnerabilities that are already present inside the local area network. This paper presents a new approach, based on neural networks, that is able to detect Zombie PCs based on the historical traffic profiles presented by \"licit\" and \"illicit\" network applications. The evaluation of the proposed methodology relies on traffic traces obtained in a controlled environment and composed by licit traffic measured from normal activity of network applications and malicious traffic synthetically generated using the SubSeven backdoor. The results obtained show that the proposed methodology is able to achieve good identification results, being at the same time computationally efficient and easy to deploy in real network scenarios.","PeriodicalId":165157,"journal":{"name":"2009 Fourth International Conference on Internet Monitoring and Protection","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128020887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
IT Security in Banking - Processes, Practical Experiences and Lessons Learned 在银行信息技术安全-过程,实践经验和教训
Pub Date : 2009-05-24 DOI: 10.1109/ICIMP.2009.21
Igor Podebrad, Martin Drotleff
This paper is intended to give an overview about the aspects of information security that are of importance in real life and should be taken into consideration during a regular IT project. Not only in the financial sector it is very popular these days to outsource certain parts of IT like application development and IT operation. From the perspective of a threat analysis team the authors experienced that it comes mostly back to the identical challenges i.e. the neglect of really fundamental issues. The following chapters do not claim to cover that topic completely neither from an academic nor a practical point of view. It is a selection of aspects that should help the reader to compile a shortlist for safeguarding information security and establishing the intended level.
本文旨在概述信息安全的各个方面,这些方面在现实生活中很重要,并且应该在常规IT项目中加以考虑。不仅在金融领域,外包it的某些部分(如应用程序开发和it操作)也非常流行。从威胁分析团队的角度来看,作者的经验是,它主要是回到相同的挑战,即忽视真正的基本问题。无论从学术角度还是从实践角度,下面的章节都不会完全涵盖这个主题。它是一个方面的选择,应该帮助读者编制一个短名单,以保障信息安全,并建立预期的水平。
{"title":"IT Security in Banking - Processes, Practical Experiences and Lessons Learned","authors":"Igor Podebrad, Martin Drotleff","doi":"10.1109/ICIMP.2009.21","DOIUrl":"https://doi.org/10.1109/ICIMP.2009.21","url":null,"abstract":"This paper is intended to give an overview about the aspects of information security that are of importance in real life and should be taken into consideration during a regular IT project. Not only in the financial sector it is very popular these days to outsource certain parts of IT like application development and IT operation. From the perspective of a threat analysis team the authors experienced that it comes mostly back to the identical challenges i.e. the neglect of really fundamental issues. The following chapters do not claim to cover that topic completely neither from an academic nor a practical point of view. It is a selection of aspects that should help the reader to compile a shortlist for safeguarding information security and establishing the intended level.","PeriodicalId":165157,"journal":{"name":"2009 Fourth International Conference on Internet Monitoring and Protection","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130769366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Developing Secure Video Surveillance Systems over IP 基于IP的安全视频监控系统的开发
Pub Date : 2009-05-24 DOI: 10.1109/ICIMP.2009.12
B. Groza, I. Silea, D. Pop, V. Patriciu
A framework of three attributes for video surveillance systems is underlined: availability, accessibility and authenticity. Under this framework, a scenario in which surveillance cameras can be accessed by remote devices, such as mobile phones, PDAs, over IP is addressed. Some security drawbacks of an off-the-shelf product are depicted and a new solution is proposed which uses cryptographic authentication for the broadcasted images. The proposed application is implemented in Java and can run on any device from standard computers to mobile phones. Also, some experimental results are presented for the case when a mobile phone is used as a receiver, this case being relevant as the device is the potential receiver with the most constrained computational resources.
强调了视频监控系统的三个属性框架:可用性、可访问性和真实性。在此框架下,解决了远程设备(如移动电话、pda)通过IP访问监控摄像机的场景。分析了现有产品存在的安全缺陷,提出了一种对广播图像进行加密认证的解决方案。所提出的应用程序是用Java实现的,可以在从标准计算机到移动电话的任何设备上运行。此外,还提供了一些实验结果,用于使用移动电话作为接收器的情况,这种情况与设备是具有最受限制的计算资源的潜在接收器相关。
{"title":"Towards Developing Secure Video Surveillance Systems over IP","authors":"B. Groza, I. Silea, D. Pop, V. Patriciu","doi":"10.1109/ICIMP.2009.12","DOIUrl":"https://doi.org/10.1109/ICIMP.2009.12","url":null,"abstract":"A framework of three attributes for video surveillance systems is underlined: availability, accessibility and authenticity. Under this framework, a scenario in which surveillance cameras can be accessed by remote devices, such as mobile phones, PDAs, over IP is addressed. Some security drawbacks of an off-the-shelf product are depicted and a new solution is proposed which uses cryptographic authentication for the broadcasted images. The proposed application is implemented in Java and can run on any device from standard computers to mobile phones. Also, some experimental results are presented for the case when a mobile phone is used as a receiver, this case being relevant as the device is the potential receiver with the most constrained computational resources.","PeriodicalId":165157,"journal":{"name":"2009 Fourth International Conference on Internet Monitoring and Protection","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129063327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing Privacy Implementations of Database Enquiries 加强数据库查询的私隐实现
Pub Date : 2009-05-24 DOI: 10.1109/ICIMP.2009.15
F. Kammüller, R. Kammüller
Privacy is an issue of increasing concern to the Internet user. To ensure the continued success of distributed information systems, a reliable information flow must be established in certified but immediately evident ways. We begin   with basic consideration of the privacy problem in the general setting of database enquiries. From there, we develop a simple solution, which we illustrate with a    simple implementation in the programming language Erlang, and conclude by providing an informal security analysis.
隐私是互联网用户日益关注的一个问题。为了确保分布式信息系统的持续成功,必须以经过认证但立即明显的方式建立可靠的信息流。我们从数据库查询的一般设置中的隐私问题的基本考虑开始。在此基础上,我们开发了一个简单的解决方案,用编程语言Erlang中的一个简单实现对其进行了说明,最后提供了一个非正式的安全性分析。
{"title":"Enhancing Privacy Implementations of Database Enquiries","authors":"F. Kammüller, R. Kammüller","doi":"10.1109/ICIMP.2009.15","DOIUrl":"https://doi.org/10.1109/ICIMP.2009.15","url":null,"abstract":"Privacy is an issue of increasing concern to the Internet user. To ensure the continued success of distributed information systems, a reliable information flow must be established in certified but immediately evident ways. We begin   with basic consideration of the privacy problem in the general setting of database enquiries. From there, we develop a simple solution, which we illustrate with a    simple implementation in the programming language Erlang, and conclude by providing an informal security analysis.","PeriodicalId":165157,"journal":{"name":"2009 Fourth International Conference on Internet Monitoring and Protection","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121668838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Where Only Fools Dare to Tread: An Empirical Study on the Prevalence of Zero-Day Malware 只有傻瓜才敢涉足的地方:零日恶意软件流行的实证研究
Pub Date : 2009-05-24 DOI: 10.1109/ICIMP.2009.19
Havard Vegge, Finn Michael Halvorsen, Rune Walso Nergard, M. Jaatun, Jostein Jensen
Zero-day malware is malware that is based on zero-day exploits and/or malware that is otherwise so new that it is not detected by any anti-virus or anti-malware scanners. This paper presents an empirical study that exposed updated Micsosoft Windows XP PCs with updated anti-virus software to a number of unsavoury Internet software repositories. A total of 124 zero-day malware instances were detected in our experiment. Our conclusion is that if a user is sufficiently adventurous (or foolish), no anti-virus protection can prevent a zero-day malware infection.
零日恶意软件是基于零日漏洞和/或恶意软件的恶意软件,否则它是如此新的,它没有被任何反病毒或反恶意软件扫描器检测到。本文提出了一项实证研究,将带有最新杀毒软件的微软Windows XP电脑暴露在一些令人讨厌的互联网软件库中。在我们的实验中共检测到124个零日恶意软件实例。我们的结论是,如果用户足够冒险(或愚蠢),没有反病毒保护可以防止零日恶意软件感染。
{"title":"Where Only Fools Dare to Tread: An Empirical Study on the Prevalence of Zero-Day Malware","authors":"Havard Vegge, Finn Michael Halvorsen, Rune Walso Nergard, M. Jaatun, Jostein Jensen","doi":"10.1109/ICIMP.2009.19","DOIUrl":"https://doi.org/10.1109/ICIMP.2009.19","url":null,"abstract":"Zero-day malware is malware that is based on zero-day exploits and/or malware that is otherwise so new that it is not detected by any anti-virus or anti-malware scanners. This paper presents an empirical study that exposed updated Micsosoft Windows XP PCs with updated anti-virus software to a number of unsavoury Internet software repositories. A total of 124 zero-day malware instances were detected in our experiment. Our conclusion is that if a user is sufficiently adventurous (or foolish), no anti-virus protection can prevent a zero-day malware infection.","PeriodicalId":165157,"journal":{"name":"2009 Fourth International Conference on Internet Monitoring and Protection","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133253082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2009 Fourth International Conference on Internet Monitoring and Protection
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1