首页 > 最新文献

2013 International Conference on Security and Cryptography (SECRYPT)最新文献

英文 中文
E3SN: Efficient security scheme for sensor networks E3SN:传感器网络的高效安全方案
Pub Date : 2013-07-29 DOI: 10.5220/0004613006150621
H. Noura, Steven Martin, K. A. Agha
Sensor networks are widely used in various areas and applications, and the need for effective security systems is increasingly essential. But most security systems are based on complex algorithms that require a high complexity and energy consumption, thus have undesirable consequences. To reduce them, a new security system called E3SN is defined. It is based on an invertible and flexible key dependent matrix to mix the contents of the packets. Our proposal can achieve simultaneously the information's confidentiality, packet's integrity and source's authentication, with a minimum of computational complexity, communication overhead and memory consumption. This matrix is secret and only the transmitter and receiver can produce it in counter mode. We evaluate our system by comparing E3SN to AES algorithm, considered reliable and robust in several standards of sensor networks such as ZigBee, WirelessHART and ISA100.11a. The results show that the proposed technique is much more efficient than AES, with the same quality of cryptography.
传感器网络广泛应用于各个领域和应用,对有效安防系统的需求日益迫切。但是,大多数安全系统都是基于复杂的算法,需要很高的复杂性和能耗,从而产生不良后果。为了减少它们,我们定义了一种名为E3SN的新安全系统。它基于一个可逆且灵活的密钥相关矩阵来混合数据包的内容。我们的方案可以同时实现信息的机密性、数据包的完整性和源的认证,并且具有最小的计算复杂度、通信开销和内存消耗。这个矩阵是保密的,只有发送器和接收器可以在计数器模式下产生它。我们通过比较E3SN和AES算法来评估我们的系统,AES算法在ZigBee、WirelessHART和ISA100.11a等传感器网络的几种标准中被认为是可靠和健壮的。结果表明,该方法在具有相同的密码学质量的情况下,比AES有效得多。
{"title":"E3SN: Efficient security scheme for sensor networks","authors":"H. Noura, Steven Martin, K. A. Agha","doi":"10.5220/0004613006150621","DOIUrl":"https://doi.org/10.5220/0004613006150621","url":null,"abstract":"Sensor networks are widely used in various areas and applications, and the need for effective security systems is increasingly essential. But most security systems are based on complex algorithms that require a high complexity and energy consumption, thus have undesirable consequences. To reduce them, a new security system called E3SN is defined. It is based on an invertible and flexible key dependent matrix to mix the contents of the packets. Our proposal can achieve simultaneously the information's confidentiality, packet's integrity and source's authentication, with a minimum of computational complexity, communication overhead and memory consumption. This matrix is secret and only the transmitter and receiver can produce it in counter mode. We evaluate our system by comparing E3SN to AES algorithm, considered reliable and robust in several standards of sensor networks such as ZigBee, WirelessHART and ISA100.11a. The results show that the proposed technique is much more efficient than AES, with the same quality of cryptography.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130915150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identity security in biometric systems based on keystroking 基于击键的生物识别系统的身份安全
Pub Date : 2013-07-29 DOI: 10.5220/0004526405240530
L. Hanzlik, W. Wodo
The most valuable element of biometric security systems are the personal features of its users. Characteristics of individuals are unique and must be protected. We focus in this paper on methods of protection of user identity in systems based on keystroking. Our approach assumes giving minimal information to adversaries and the best responsiveness of the system regardless of user representation or possible usage. We consider keystroking not only in the context of keyboard, but also touch screen, pin pad and any other input device that could be used for typing. We present as results several complete security solutions that are applicable for software as well as hardware systems.
生物识别安全系统最有价值的元素是其用户的个人特征。个人的特征是独一无二的,必须受到保护。本文主要研究了基于击键的系统中用户身份保护的方法。我们的方法假设向对手提供最少的信息,并且无论用户表示或可能的使用情况如何,系统都具有最佳响应性。我们考虑击键不仅仅是在键盘的背景下,还包括触摸屏,pin pad和任何其他可以用于打字的输入设备。我们提出了几个完整的安全解决方案,适用于软件和硬件系统。
{"title":"Identity security in biometric systems based on keystroking","authors":"L. Hanzlik, W. Wodo","doi":"10.5220/0004526405240530","DOIUrl":"https://doi.org/10.5220/0004526405240530","url":null,"abstract":"The most valuable element of biometric security systems are the personal features of its users. Characteristics of individuals are unique and must be protected. We focus in this paper on methods of protection of user identity in systems based on keystroking. Our approach assumes giving minimal information to adversaries and the best responsiveness of the system regardless of user representation or possible usage. We consider keystroking not only in the context of keyboard, but also touch screen, pin pad and any other input device that could be used for typing. We present as results several complete security solutions that are applicable for software as well as hardware systems.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124203101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving 802.11 fingerprinting of similar devices by cooperative fingerprinting 通过合作指纹识别,提高同类设备的802.11指纹识别能力
Pub Date : 2013-07-29 DOI: 10.5220/0004529103790386
Clémentine Maurice, Stéphane Onno, C. Neumann, Olivier Heen, Aurélien Francillon
Fingerprinting 802.11 devices has been proposed to identify devices in order to mitigate IEEE 802.11 weaknesses. However, important limitations prevent any real deployment. On the first hand, fingerprinting has a low accuracy when the devices have similar hardware and software. On the second hand, attackers may forge signatures to impersonate devices. We propose Diversity, a cooperative fingerprinting approach that improves accuracy of existing fingerprinting methods while relying only on off-the-shelf hardware. Diversity improves fingerprinting up to the reliable individual identification of identical 802.11 devices. This approach modifies the signature of devices by modifying slightly their traffic attributes. We evaluate Diversity with both a simulation and an implementation, achieving a false positive rate of 0% with a dataset including identical devices. Finally, we complement Diversity by mechanisms for detecting attackers that try to forge signatures.
为了减轻IEEE 802.11的弱点,已经提出对802.11设备进行指纹识别来识别设备。然而,重要的限制阻碍了任何实际部署。首先,当设备的硬件和软件相似时,指纹识别的准确性很低。另一方面,攻击者可能伪造签名来冒充设备。我们提出多样性,一种合作指纹识别方法,提高了现有指纹识别方法的准确性,而只依赖于现成的硬件。多样性改进了指纹识别,使其能够可靠地识别相同的802.11设备。这种方法通过稍微修改设备的流量属性来修改设备的签名。我们通过模拟和实现来评估多样性,在包含相同设备的数据集上实现了0%的误报率。最后,我们通过检测试图伪造签名的攻击者的机制来补充多样性。
{"title":"Improving 802.11 fingerprinting of similar devices by cooperative fingerprinting","authors":"Clémentine Maurice, Stéphane Onno, C. Neumann, Olivier Heen, Aurélien Francillon","doi":"10.5220/0004529103790386","DOIUrl":"https://doi.org/10.5220/0004529103790386","url":null,"abstract":"Fingerprinting 802.11 devices has been proposed to identify devices in order to mitigate IEEE 802.11 weaknesses. However, important limitations prevent any real deployment. On the first hand, fingerprinting has a low accuracy when the devices have similar hardware and software. On the second hand, attackers may forge signatures to impersonate devices. We propose Diversity, a cooperative fingerprinting approach that improves accuracy of existing fingerprinting methods while relying only on off-the-shelf hardware. Diversity improves fingerprinting up to the reliable individual identification of identical 802.11 devices. This approach modifies the signature of devices by modifying slightly their traffic attributes. We evaluate Diversity with both a simulation and an implementation, achieving a false positive rate of 0% with a dataset including identical devices. Finally, we complement Diversity by mechanisms for detecting attackers that try to forge signatures.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131897009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
MINHO: A novel authentication scheme based on pre-authentication service MINHO:一种基于预认证服务的新型认证方案
Pub Date : 2013-07-29 DOI: 10.5220/0004610205860594
Hasan Kadhem
This paper presents a novel authentication scheme called MINHO, which protects users from unauthorized access even when their passwords have been stolen. At the same time, MINHO detects any tries for unauthorized access by attackers. Our idea is to use a mobile phone to send a request with specific parameters to the service provider before the actual authentication process, then, the service provider verifies the pre-authentication parameters during the authentication process. We propose many parameters that can be used with the pre-authentication service such as Authentication Ticket (AT), time, and location. MINHO is a practical scheme that can be used with the current systems, without (hardware/software) changes on the terminal side. It is a cost effective scheme, easy to use, and does not rely on a third party.
本文提出了一种名为MINHO的新型认证方案,即使用户的密码被盗,也可以保护用户免受未经授权的访问。同时,MINHO检测攻击者对未经授权访问的任何尝试。我们的想法是在实际认证过程之前,使用手机向服务提供商发送带有特定参数的请求,然后服务提供商在认证过程中验证预认证参数。我们提出了许多可用于预身份验证服务的参数,例如身份验证票据(Authentication Ticket, AT)、时间和位置。MINHO是一种实用的方案,可以与当前的系统一起使用,而无需在终端端进行(硬件/软件)更改。这是一种成本有效的方案,易于使用,并且不依赖于第三方。
{"title":"MINHO: A novel authentication scheme based on pre-authentication service","authors":"Hasan Kadhem","doi":"10.5220/0004610205860594","DOIUrl":"https://doi.org/10.5220/0004610205860594","url":null,"abstract":"This paper presents a novel authentication scheme called MINHO, which protects users from unauthorized access even when their passwords have been stolen. At the same time, MINHO detects any tries for unauthorized access by attackers. Our idea is to use a mobile phone to send a request with specific parameters to the service provider before the actual authentication process, then, the service provider verifies the pre-authentication parameters during the authentication process. We propose many parameters that can be used with the pre-authentication service such as Authentication Ticket (AT), time, and location. MINHO is a practical scheme that can be used with the current systems, without (hardware/software) changes on the terminal side. It is a cost effective scheme, easy to use, and does not rely on a third party.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121076211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public-key cryptography from different assumptions: A multi-bit version 基于不同假设的公钥加密:多比特版本
Pub Date : 2013-07-29 DOI: 10.5220/0004600205610567
H. Chabanne, G. Cohen, Alain Patey
At STOC 2010, Applebaum, Barak and Wigderson introduced three new public-key cryptosystems based on combinatorial assumptions. In their paper, only encryption of bits has been considered. In this paper, we focus on one of their schemes and adapt it to encrypt a constant number of bits in a single ciphertext without changing the size of the public key. We add wire-tap channel techniques to improve the security level of our scheme, thus reaching indistinguishability. We show that it is homomorphic for the XOR operation on bit strings. We also suggest concrete parameters for a first instantiation of our scheme.
在STOC 2010上,Applebaum, Barak和Wigderson基于组合假设引入了三个新的公钥密码系统。在他们的论文中,只考虑了比特的加密。在本文中,我们重点研究了他们的一种方案,并对其进行了调整,使其在不改变公钥大小的情况下对单个密文中的恒定位数进行加密。我们增加了窃听通道技术来提高我们方案的安全级别,从而达到不可区分。我们证明了位串上的异或运算是同态的。我们还为我们的方案的第一个实例提出了具体参数。
{"title":"Public-key cryptography from different assumptions: A multi-bit version","authors":"H. Chabanne, G. Cohen, Alain Patey","doi":"10.5220/0004600205610567","DOIUrl":"https://doi.org/10.5220/0004600205610567","url":null,"abstract":"At STOC 2010, Applebaum, Barak and Wigderson introduced three new public-key cryptosystems based on combinatorial assumptions. In their paper, only encryption of bits has been considered. In this paper, we focus on one of their schemes and adapt it to encrypt a constant number of bits in a single ciphertext without changing the size of the public key. We add wire-tap channel techniques to improve the security level of our scheme, thus reaching indistinguishability. We show that it is homomorphic for the XOR operation on bit strings. We also suggest concrete parameters for a first instantiation of our scheme.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117202384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keystroke authentication with a capacitive display using different mobile devices 使用不同移动设备的电容式显示器进行击键认证
Pub Date : 2013-07-29 DOI: 10.5220/0004606105800585
Matthias Trojahn, Christian Schadewald, F. Ortmeier
This study investigates keystroke dynamics as biometric authentication on different smartphones. We analysed different sensors in the smartphones which affect the error rates of the authentication. We also evaluate the effectiveness of different features based on the error rates. In addition, a framework is presented for using one device as a base model to authenticate the same person on other devices. We conduct with an experiment with three devices and three different keywords to assess how well different devices can be used (error rates smaller than 3.5 %) and suitable combinations of devices. Moreover, our experiment results showed that passwords spread over the whole keyboard have lower error rates.
这项研究调查了击键动力学作为不同智能手机的生物识别认证。我们分析了智能手机中影响身份验证错误率的不同传感器。我们还根据错误率评估了不同特征的有效性。此外,还提供了一个框架,用于使用一个设备作为基本模型对其他设备上的同一个人进行身份验证。我们使用三种设备和三个不同的关键词进行实验,以评估不同设备的使用效果(错误率小于3.5%)和设备的合适组合。此外,我们的实验结果表明,密码分散在整个键盘具有较低的错误率。
{"title":"Keystroke authentication with a capacitive display using different mobile devices","authors":"Matthias Trojahn, Christian Schadewald, F. Ortmeier","doi":"10.5220/0004606105800585","DOIUrl":"https://doi.org/10.5220/0004606105800585","url":null,"abstract":"This study investigates keystroke dynamics as biometric authentication on different smartphones. We analysed different sensors in the smartphones which affect the error rates of the authentication. We also evaluate the effectiveness of different features based on the error rates. In addition, a framework is presented for using one device as a base model to authenticate the same person on other devices. We conduct with an experiment with three devices and three different keywords to assess how well different devices can be used (error rates smaller than 3.5 %) and suitable combinations of devices. Moreover, our experiment results showed that passwords spread over the whole keyboard have lower error rates.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129065469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Meet-in-the-middle preimage attacks revisited new results on MD5 and HAVAL 中间相遇预映像攻击重新访问MD5和HAVAL上的新结果
Pub Date : 2013-07-29 DOI: 10.5220/0004521101110122
Yu Sasaki, Wataru Komatsubara, Yasuhide Sakai, Lei Wang, Mitsugu Iwamoto, K. Sakiyama, K. Ohta
In this paper, we revisit previous meet-in-the-middle preimage attacks on hash functions. We firstly present a technical improvement for the existing local-collision and initial-structure techniques. With applying some equivalent transformation, we can significantly reduce the memory requirement from the original proposals. We then revisit the previous preimage attacks on MD5 and HAVAL with recent techniques. Consequently, we can improve the memory complexity of the previous preimage attack on full MD5 from 245 to 213 and on full 4-pass HAVAL from 264 to 232. Moreover, we extend the preimage attack on 5-pass HAVAL from 151 steps to 158 steps, and present the first preimage attack with a single block message for 3-pass HAVAL.
在本文中,我们回顾了先前对哈希函数的中间相遇预像攻击。我们首先对现有的局部碰撞和初始结构技术进行了技术改进。通过应用一些等效的转换,我们可以大大减少原始提议的内存需求。然后,我们用最新的技术回顾之前对MD5和HAVAL的预映像攻击。因此,我们可以将之前的全MD5攻击的内存复杂度从245提高到213,将全4-pass HAVAL攻击的内存复杂度从264提高到232。此外,我们将5步HAVAL的预像攻击从151步扩展到158步,并提出了针对3步HAVAL的第一个带有单个块消息的预像攻击。
{"title":"Meet-in-the-middle preimage attacks revisited new results on MD5 and HAVAL","authors":"Yu Sasaki, Wataru Komatsubara, Yasuhide Sakai, Lei Wang, Mitsugu Iwamoto, K. Sakiyama, K. Ohta","doi":"10.5220/0004521101110122","DOIUrl":"https://doi.org/10.5220/0004521101110122","url":null,"abstract":"In this paper, we revisit previous meet-in-the-middle preimage attacks on hash functions. We firstly present a technical improvement for the existing local-collision and initial-structure techniques. With applying some equivalent transformation, we can significantly reduce the memory requirement from the original proposals. We then revisit the previous preimage attacks on MD5 and HAVAL with recent techniques. Consequently, we can improve the memory complexity of the previous preimage attack on full MD5 from 245 to 213 and on full 4-pass HAVAL from 264 to 232. Moreover, we extend the preimage attack on 5-pass HAVAL from 151 steps to 158 steps, and present the first preimage attack with a single block message for 3-pass HAVAL.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128171362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient characteristic 3 Galois field operations for elliptic curve cryptographic applications 椭圆曲线密码应用的高效伽罗瓦域运算
Pub Date : 2013-07-29 DOI: 10.5220/0004528105310536
Vinay S. Iyengar
Galois fields of characteristic 3, where the number of field elements is a power of 3, have a distinctive application in building high-security elliptic curve cryptosystems. However, they are not typically used because of their relative inefficiency in computing polynomial operations when compared to conventional prime or binary Galois fields. The purpose of this research was to design and implement characteristic 3 Galois field arithmetic algorithms with greater overall efficiency than those presented in current literature, and to evaluate their applicability to elliptic curve cryptography. The algorithms designed were tested in a C++ program and using a mapping of field element logarithms, were able to simplify the operations of polynomial multiplication, division, cubing, and modular reduction to that of basic integer operations. They thus significantly outperformed the best characteristic 3 algorithms presented in literature and showed a distinct applicability to elliptic curve cryptosystems. In conclusion, this research presents a novel method of optimizing the performance of characteristic 3 Galois fields and has major implications for the field of elliptic curve cryptography.
特征为3的伽罗瓦域,其中域元素的个数是3的幂,在构建高安全性椭圆曲线密码系统中具有独特的应用。然而,它们通常不被使用,因为与传统的素数或二进制伽罗瓦域相比,它们在计算多项式运算方面效率相对较低。本研究的目的是设计和实现比现有文献中提出的整体效率更高的特征伽罗瓦域算法,并评估其在椭圆曲线密码术中的适用性。所设计的算法在一个c++程序中进行了测试,并使用域元素对数的映射,能够将多项式的乘法、除法、立方和模约简化为基本的整数运算。因此,它们明显优于文献中提出的最佳特征3算法,并显示出对椭圆曲线密码系统的明显适用性。总之,本研究提出了一种优化特征3伽罗瓦域性能的新方法,对椭圆曲线密码学领域具有重要意义。
{"title":"Efficient characteristic 3 Galois field operations for elliptic curve cryptographic applications","authors":"Vinay S. Iyengar","doi":"10.5220/0004528105310536","DOIUrl":"https://doi.org/10.5220/0004528105310536","url":null,"abstract":"Galois fields of characteristic 3, where the number of field elements is a power of 3, have a distinctive application in building high-security elliptic curve cryptosystems. However, they are not typically used because of their relative inefficiency in computing polynomial operations when compared to conventional prime or binary Galois fields. The purpose of this research was to design and implement characteristic 3 Galois field arithmetic algorithms with greater overall efficiency than those presented in current literature, and to evaluate their applicability to elliptic curve cryptography. The algorithms designed were tested in a C++ program and using a mapping of field element logarithms, were able to simplify the operations of polynomial multiplication, division, cubing, and modular reduction to that of basic integer operations. They thus significantly outperformed the best characteristic 3 algorithms presented in literature and showed a distinct applicability to elliptic curve cryptosystems. In conclusion, this research presents a novel method of optimizing the performance of characteristic 3 Galois fields and has major implications for the field of elliptic curve cryptography.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130062052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HoneydV6: A low-interaction IPv6 honeypot HoneydV6:低交互IPv6蜜罐
Pub Date : 2013-07-29 DOI: 10.5220/0004515100860097
S. Schindler, Bettina Schnor, Simon Kiertscher, T. Scheffler, Eldad Zack
This paper starts with the presentation of results from an IPv6-darknet experiment that we conducted during summer 2012. The experiment indicates that attackers are gaining interest in IPv6 networks and appropriate security tools need to be readied. Therefore, we propose HoneydV6, a low-interaction IPv6 honeypot that can simulate entire IPv6 networks and which may be utilized to detect and analyze IPv6 network attacks. Our implementation extends the well-known low-interaction honeypot Honeyd. To the best of our knowledge, this is the first low-interaction honeypot which is able to simulate entire IPv6 networks on a single host. The huge IPv6 address spaces requires new approaches and concepts in order to enable attackers to find and exploit a honeypot. We increase the chance for an attacker to find a target host in our IPv6 honeypot by reacting to the attacker's requests with the dynamic generation of new IPv6 host instances in the honeynet.
本文首先介绍了我们在2012年夏季进行的ipv6暗网实验的结果。实验表明,攻击者对IPv6网络越来越感兴趣,需要准备适当的安全工具。因此,我们提出了HoneydV6,这是一个低交互的IPv6蜜罐,可以模拟整个IPv6网络,并可用于检测和分析IPv6网络攻击。我们的实现扩展了众所周知的低交互蜜罐Honeyd。据我们所知,这是第一个能够在单个主机上模拟整个IPv6网络的低交互蜜罐。巨大的IPv6地址空间需要新的方法和概念,以使攻击者能够找到并利用蜜罐。我们通过在蜜网中动态生成新的IPv6主机实例来响应攻击者的请求,从而增加攻击者在我们的IPv6蜜罐中找到目标主机的机会。
{"title":"HoneydV6: A low-interaction IPv6 honeypot","authors":"S. Schindler, Bettina Schnor, Simon Kiertscher, T. Scheffler, Eldad Zack","doi":"10.5220/0004515100860097","DOIUrl":"https://doi.org/10.5220/0004515100860097","url":null,"abstract":"This paper starts with the presentation of results from an IPv6-darknet experiment that we conducted during summer 2012. The experiment indicates that attackers are gaining interest in IPv6 networks and appropriate security tools need to be readied. Therefore, we propose HoneydV6, a low-interaction IPv6 honeypot that can simulate entire IPv6 networks and which may be utilized to detect and analyze IPv6 network attacks. Our implementation extends the well-known low-interaction honeypot Honeyd. To the best of our knowledge, this is the first low-interaction honeypot which is able to simulate entire IPv6 networks on a single host. The huge IPv6 address spaces requires new approaches and concepts in order to enable attackers to find and exploit a honeypot. We increase the chance for an attacker to find a target host in our IPv6 honeypot by reacting to the attacker's requests with the dynamic generation of new IPv6 host instances in the honeynet.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134444596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Which side are you on? A new Panopticon vs. privacy 你站在哪一边?一个新的圆形监狱vs.隐私
Pub Date : 2013-07-29 DOI: 10.5220/0004516500980110
Miltiadis Kandias, L. Mitrou, V. Stavrou, D. Gritzalis
Social media and Web 2.0 have enabled internet users to contribute online content, which may be crawled and utilized for a variety of reasons, from personalized advertising to behaviour prediction/profiling. One negative case scenario is the political affiliation profiling. Our hypothesis is that this scenario is nowadays realistic, applicable to social media, and violates civil rights, privacy and freedom. To demonstrate this, we developed a horror story, i.e., a Panopticon method, in order to reveal this threat and contribute in raising the social awareness over it. The Panopticon relies on data/opinion mining techniques; hence it classifies comments, videos and playlists, collected from the popular social medium YouTube. Afterwards, it aggregates these classifications in order to decide over the users' political affiliation. The experimental test case of the Panopticon is an extensive Greek community of YouTube users. In order to demonstrate our case, we performed an extensive graph theoretical and content analysis of the collected dataset and show how and what kind of personal data (e.g. political attitude) can be derived via data mining on publicly available YouTube data. Then, we provide the reader with an analysis of the legal means that are available today, to a citizen or a society as a whole, so as to effectively be prevented from such a threat.
社交媒体和Web 2.0使互联网用户能够贡献在线内容,这些内容可能会被抓取并用于各种原因,从个性化广告到行为预测/分析。一个消极的情况是政治派别分析。我们的假设是,这种情况现在是现实的,适用于社交媒体,侵犯了公民权利、隐私和自由。为了证明这一点,我们开发了一个恐怖故事,即Panopticon方法,以揭示这种威胁,并有助于提高社会对它的认识。圆形监狱依赖于数据/意见挖掘技术;因此,它对从流行的社交媒体YouTube上收集的评论、视频和播放列表进行分类。然后,它汇总这些分类,以决定用户的政治派别。圆形监狱的实验案例是一个庞大的希腊YouTube用户社区。为了证明我们的案例,我们对收集的数据集进行了广泛的图形理论和内容分析,并展示了如何以及什么样的个人数据(例如政治态度)可以通过对公开可用的YouTube数据进行数据挖掘来获得。然后,我们为读者提供了今天可用的法律手段的分析,一个公民或一个社会作为一个整体,以有效地防止这种威胁。
{"title":"Which side are you on? A new Panopticon vs. privacy","authors":"Miltiadis Kandias, L. Mitrou, V. Stavrou, D. Gritzalis","doi":"10.5220/0004516500980110","DOIUrl":"https://doi.org/10.5220/0004516500980110","url":null,"abstract":"Social media and Web 2.0 have enabled internet users to contribute online content, which may be crawled and utilized for a variety of reasons, from personalized advertising to behaviour prediction/profiling. One negative case scenario is the political affiliation profiling. Our hypothesis is that this scenario is nowadays realistic, applicable to social media, and violates civil rights, privacy and freedom. To demonstrate this, we developed a horror story, i.e., a Panopticon method, in order to reveal this threat and contribute in raising the social awareness over it. The Panopticon relies on data/opinion mining techniques; hence it classifies comments, videos and playlists, collected from the popular social medium YouTube. Afterwards, it aggregates these classifications in order to decide over the users' political affiliation. The experimental test case of the Panopticon is an extensive Greek community of YouTube users. In order to demonstrate our case, we performed an extensive graph theoretical and content analysis of the collected dataset and show how and what kind of personal data (e.g. political attitude) can be derived via data mining on publicly available YouTube data. Then, we provide the reader with an analysis of the legal means that are available today, to a citizen or a society as a whole, so as to effectively be prevented from such a threat.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133338403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
期刊
2013 International Conference on Security and Cryptography (SECRYPT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1