首页 > 最新文献

2021 IEEE Conference on Dependable and Secure Computing (DSC)最新文献

英文 中文
Highly Efficient Anonymous IoT Authentication using Composite Hashing 使用复合哈希的高效匿名物联网身份验证
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346263
H. Chien
Considering many Internet of Things (IoT) devices are resource-limited and their identities might disclose sensitive information, highly efficient and anonymous IoT authentication scheme is desirable for these IoT scenarios. In this paper, we propose a new anonymous IoT authentication scheme, using the composite hashing. The merits of this work are four-fold. (1) A new anonymous IoT authentication scheme is proposed; (2) the pre-calculation of pseudonym vectors can tackle Denial-of-Service attacks or unreliable connection issues; (3) the evaluations and analysis demonstrate its excellent performance in terms of computation, communication, and security properties; (4) an instantiation of applying this scheme on a standard IOT protocol like MQTT is described. Its excellent performances make it very attractive for those resource-limited IoT devices with anonymity requirement.
考虑到许多物联网设备资源有限,其身份可能会泄露敏感信息,高效、匿名的物联网认证方案是这些物联网场景所需要的。在本文中,我们提出了一种新的匿名物联网认证方案,使用复合哈希。这项工作的优点有四倍。(1)提出了一种新的物联网匿名认证方案;(2)假名向量的预计算可以解决拒绝服务攻击或不可靠连接问题;(3)评价和分析表明其在计算、通信和安全性能方面具有优异的性能;(4)描述了在MQTT等标准物联网协议上应用该方案的实例。它的优异性能使得它对那些资源有限、有匿名要求的物联网设备非常有吸引力。
{"title":"Highly Efficient Anonymous IoT Authentication using Composite Hashing","authors":"H. Chien","doi":"10.1109/DSC49826.2021.9346263","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346263","url":null,"abstract":"Considering many Internet of Things (IoT) devices are resource-limited and their identities might disclose sensitive information, highly efficient and anonymous IoT authentication scheme is desirable for these IoT scenarios. In this paper, we propose a new anonymous IoT authentication scheme, using the composite hashing. The merits of this work are four-fold. (1) A new anonymous IoT authentication scheme is proposed; (2) the pre-calculation of pseudonym vectors can tackle Denial-of-Service attacks or unreliable connection issues; (3) the evaluations and analysis demonstrate its excellent performance in terms of computation, communication, and security properties; (4) an instantiation of applying this scheme on a standard IOT protocol like MQTT is described. Its excellent performances make it very attractive for those resource-limited IoT devices with anonymity requirement.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126143390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Secure Outsourced Private Set Intersection with Linear Complexity 具有线性复杂度的安全外包私有集交集
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346230
Sumit Kumar Debnath, K. Sakurai, Kunal Dey, Nibedita Kundu
In the context of privacy preserving protocols, Private Set Intersection (PSI) plays an important role due to their wide applications in recent research community. In general, PSI involves two participants to securely determine the intersection of their respective input sets, not beyond that. These days, in the context of PSI, it is become a common practice to store datasets in the cloud and delegate PSI computation to the cloud on outsourced datasets, similar to secure cloud computing. We call this outsourced PSI as OPSI. In this paper, we design a new construction of OPSI in malicious setting under the Decisional Diffie-Hellman (DDH) assumption without using any random oracle. In particular, our OPSI is the first that incurs linear complexity in malicious environment with not-interactive setup. Further, we employ a random permutation to extend our OPSI to its cardinality variant OPSI-CA. In this case, all the properties remain unchanged except that the adversarial model is semi-honest instead of malicious.
在隐私保护协议的背景下,私有集交集(Private Set Intersection, PSI)由于其广泛的应用而在近年来的研究中扮演着重要的角色。通常,PSI涉及两个参与者来安全地确定他们各自输入集的交集,而不是超出交集。如今,在PSI的背景下,将数据集存储在云中并将PSI计算委托给外包数据集上的云已成为一种常见的做法,类似于安全云计算。我们把这种外包PSI称为OPSI。本文在DDH (Decisional Diffie-Hellman)假设下,设计了一种新的恶意设置下的OPSI结构,不使用任何随机oracle。特别是,我们的OPSI是第一个在非交互式设置的恶意环境中产生线性复杂性的OPSI。此外,我们采用随机排列将我们的OPSI扩展到其基数变体OPSI- ca。在这种情况下,除了对抗性模型是半诚实的而不是恶意的,所有属性都保持不变。
{"title":"Secure Outsourced Private Set Intersection with Linear Complexity","authors":"Sumit Kumar Debnath, K. Sakurai, Kunal Dey, Nibedita Kundu","doi":"10.1109/DSC49826.2021.9346230","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346230","url":null,"abstract":"In the context of privacy preserving protocols, Private Set Intersection (PSI) plays an important role due to their wide applications in recent research community. In general, PSI involves two participants to securely determine the intersection of their respective input sets, not beyond that. These days, in the context of PSI, it is become a common practice to store datasets in the cloud and delegate PSI computation to the cloud on outsourced datasets, similar to secure cloud computing. We call this outsourced PSI as OPSI. In this paper, we design a new construction of OPSI in malicious setting under the Decisional Diffie-Hellman (DDH) assumption without using any random oracle. In particular, our OPSI is the first that incurs linear complexity in malicious environment with not-interactive setup. Further, we employ a random permutation to extend our OPSI to its cardinality variant OPSI-CA. In this case, all the properties remain unchanged except that the adversarial model is semi-honest instead of malicious.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131798075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Distributed Ledger Management Mechanism for Storing and Selling Private Data 存储和销售私有数据的分布式账本管理机制
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346258
Sabyasachi Dutta, Arinjita Paul, Rocki H. Ozaki, C. Rangan, K. Sakurai
Storing and processing huge amount of private data is a challenging problem. The problem becomes, in particular, interesting if the user-side storage and computational power is limited. One way to solve the problem of outsourcing private data and maintaining an access control on the storage is proposed by using blockchain technology. However, blockchain technology requires heavy computational power and machinery. In this paper, we propose an approach to store and sell private data with the help of secret sharing. In comparison to blockchain, our methodology is simpler and preserves the privacy of stored data.
存储和处理大量私人数据是一个具有挑战性的问题。如果用户端存储和计算能力有限,这个问题就会变得特别有趣。提出了一种利用区块链技术解决私有数据外包和存储访问控制问题的方法。然而,区块链技术需要强大的计算能力和机器。在本文中,我们提出了一种利用秘密共享来存储和销售私有数据的方法。与区块链相比,我们的方法更简单,并保留了存储数据的隐私。
{"title":"A Distributed Ledger Management Mechanism for Storing and Selling Private Data","authors":"Sabyasachi Dutta, Arinjita Paul, Rocki H. Ozaki, C. Rangan, K. Sakurai","doi":"10.1109/DSC49826.2021.9346258","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346258","url":null,"abstract":"Storing and processing huge amount of private data is a challenging problem. The problem becomes, in particular, interesting if the user-side storage and computational power is limited. One way to solve the problem of outsourcing private data and maintaining an access control on the storage is proposed by using blockchain technology. However, blockchain technology requires heavy computational power and machinery. In this paper, we propose an approach to store and sell private data with the help of secret sharing. In comparison to blockchain, our methodology is simpler and preserves the privacy of stored data.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132942110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Security of Permissionless Blockchain Systems: Challenges and Research Perspective 关于无许可区块链系统的安全性:挑战和研究视角
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346243
Hao Wang, Chunpeng Ge, Zhe Liu
Blockchain technology enables global mutually trustless participants to reach a consensus on the final state of permissionless distributed and decentralized ledgers. Due to its properties of openness, transparency, irreversibility, and credibility, many systems have been built based on blockchains' structure, such as Bitcoin and Ethereum. With the wide application of blockchains, however, many security problems still exist in blockchains and there have been many malicious attacks against blockchain systems. Although these attacks have been proposed, there lacks a systematic exploration of how these attacks have been conducted and what underlying relationship they have. In this paper, we firstly present and summarize several current attacks on blockchains in three aspects: system deficiency attacks, mining attacks, and network-level attacks. Secondly, we conduct a systematic analysis and evaluation of the possibility of these attacks occurring on major blockchain platforms. Finally, we motivate some research perspectives and challenges for blockchain system security and highlight some potential solutions to these problems.
区块链技术使全球互不信任的参与者就无权限分布式和去中心化账本的最终状态达成共识。由于其开放性、透明性、不可逆性和可信性,许多系统都是基于区块链的结构构建的,例如比特币和以太坊。然而,随着区块链的广泛应用,区块链仍然存在许多安全问题,针对区块链系统的恶意攻击也很多。尽管已经提出了这些攻击,但对于这些攻击是如何进行的以及它们之间的潜在关系,缺乏系统的探索。在本文中,我们首先从系统缺陷攻击、挖掘攻击和网络级攻击三个方面介绍和总结了当前针对区块链的几种攻击。其次,我们对这些攻击发生在主要区块链平台上的可能性进行了系统的分析和评估。最后,我们激发了区块链系统安全的一些研究观点和挑战,并强调了这些问题的一些潜在解决方案。
{"title":"On the Security of Permissionless Blockchain Systems: Challenges and Research Perspective","authors":"Hao Wang, Chunpeng Ge, Zhe Liu","doi":"10.1109/DSC49826.2021.9346243","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346243","url":null,"abstract":"Blockchain technology enables global mutually trustless participants to reach a consensus on the final state of permissionless distributed and decentralized ledgers. Due to its properties of openness, transparency, irreversibility, and credibility, many systems have been built based on blockchains' structure, such as Bitcoin and Ethereum. With the wide application of blockchains, however, many security problems still exist in blockchains and there have been many malicious attacks against blockchain systems. Although these attacks have been proposed, there lacks a systematic exploration of how these attacks have been conducted and what underlying relationship they have. In this paper, we firstly present and summarize several current attacks on blockchains in three aspects: system deficiency attacks, mining attacks, and network-level attacks. Secondly, we conduct a systematic analysis and evaluation of the possibility of these attacks occurring on major blockchain platforms. Finally, we motivate some research perspectives and challenges for blockchain system security and highlight some potential solutions to these problems.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"383 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134211113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designated Verifier Signature Transformation: A New Framework for One-Time Delegating Verifiability 指定验证者签名转换:一次性授权验证的新框架
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346244
Jian-Feng Lin, Jun-Rui Wang, Che-Chia Chang, Yu-Chi Chen
Designated verifier signature (DVS) is a variant of digital signature which can designate a verifier to verify signatures. The main difference between message authentication code and DVS is that no shared key is initially set in DVS. In this paper, we propose a new notion, designated verifier signature transformation (DVST), which allows a cloud server to convert a DVS to a multi-designated verifier signature (MDVS) as long as the original verifier provides a token to the server. For more flexible use, the converted signature can support verification with more than threshold number of designated verifiers. Accordingly, a specific security definition is formalized as token unforgability. Our construction is proposed and built from bilinear map with security analysis.
指定验证者签名(DVS)是数字签名的一种变体,它可以指定一个验证者来验证签名。消息验证码与分布式交换机的主要区别在于,分布式交换机初始化时不设置共享密钥。在本文中,我们提出了一个新的概念,指定验证者签名转换(DVST),它允许云服务器将DVS转换为多指定验证者签名(mddvs),只要原始验证者向服务器提供令牌。为了更灵活地使用,转换后的签名可以支持指定验证者数量超过阈值的验证。因此,一个特定的安全定义被形式化为令牌不可遗忘性。我们的构造是在双线性映射的基础上提出并建立的,并进行了安全性分析。
{"title":"Designated Verifier Signature Transformation: A New Framework for One-Time Delegating Verifiability","authors":"Jian-Feng Lin, Jun-Rui Wang, Che-Chia Chang, Yu-Chi Chen","doi":"10.1109/DSC49826.2021.9346244","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346244","url":null,"abstract":"Designated verifier signature (DVS) is a variant of digital signature which can designate a verifier to verify signatures. The main difference between message authentication code and DVS is that no shared key is initially set in DVS. In this paper, we propose a new notion, designated verifier signature transformation (DVST), which allows a cloud server to convert a DVS to a multi-designated verifier signature (MDVS) as long as the original verifier provides a token to the server. For more flexible use, the converted signature can support verification with more than threshold number of designated verifiers. Accordingly, a specific security definition is formalized as token unforgability. Our construction is proposed and built from bilinear map with security analysis.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115627657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BDF-SDN: A Big Data Framework for DDoS Attack Detection in Large-Scale SDN-Based Cloud BDF-SDN:大规模sdn云环境下DDoS攻击检测的大数据框架
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346269
Phuc Trinh Dinh, Minho Park
Software-defined networking (SDN) nowadays is extensively being used in a variety of practical settings, provides a new way to manage networks by separating the data plane from its control plane. However, SDN is particularly vulnerable to Distributed Denial of Service (DDoS) attacks because of its centralized control logic. Many studies have been proposed to tackle DDoS attacks in an SDN design using machine-learning-based schemes; however, these feature-based detection schemes are highly resource-intensive and they are unable to perform reliably in such a large-scale SDN network where a massive amount of traffic data is generated from both control and data planes. This can deplete computing resources, degrade network performance, or even shut down the network systems owing to being exhausting resources. To address the above challenges, this paper proposes a big data framework to overcome traditional data processing limitations and to exploit distributed resources effectively for the most compute-intensive tasks such as DDoS attack detection using machine learning techniques, etc. We demonstrate the robustness, scalability, and effectiveness of our framework through practical experiments.
软件定义网络(SDN)通过将数据平面与控制平面分离,提供了一种新的网络管理方式,目前已广泛应用于各种实际环境中。然而,SDN由于其集中控制逻辑,特别容易受到DDoS (Distributed Denial of Service)攻击。已经提出了许多研究,使用基于机器学习的方案来解决SDN设计中的DDoS攻击;然而,这些基于特征的检测方案是高度资源密集型的,无法在如此大规模的SDN网络中可靠地执行,因为SDN网络的控制平面和数据平面都产生了大量的流量数据。这可能会耗尽计算资源,降低网络性能,甚至由于资源耗尽而关闭网络系统。为了解决上述挑战,本文提出了一个大数据框架,以克服传统的数据处理限制,并有效地利用分布式资源进行最计算密集型的任务,如使用机器学习技术进行DDoS攻击检测等。我们通过实际实验证明了我们的框架的健壮性、可伸缩性和有效性。
{"title":"BDF-SDN: A Big Data Framework for DDoS Attack Detection in Large-Scale SDN-Based Cloud","authors":"Phuc Trinh Dinh, Minho Park","doi":"10.1109/DSC49826.2021.9346269","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346269","url":null,"abstract":"Software-defined networking (SDN) nowadays is extensively being used in a variety of practical settings, provides a new way to manage networks by separating the data plane from its control plane. However, SDN is particularly vulnerable to Distributed Denial of Service (DDoS) attacks because of its centralized control logic. Many studies have been proposed to tackle DDoS attacks in an SDN design using machine-learning-based schemes; however, these feature-based detection schemes are highly resource-intensive and they are unable to perform reliably in such a large-scale SDN network where a massive amount of traffic data is generated from both control and data planes. This can deplete computing resources, degrade network performance, or even shut down the network systems owing to being exhausting resources. To address the above challenges, this paper proposes a big data framework to overcome traditional data processing limitations and to exploit distributed resources effectively for the most compute-intensive tasks such as DDoS attack detection using machine learning techniques, etc. We demonstrate the robustness, scalability, and effectiveness of our framework through practical experiments.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116405497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Smart Markers in Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for Decentralized Runtime Verification 智能合约中的智能标记:在区块链中启用多路分支和合并以进行分散的运行时验证
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346270
Tieming Geng, L. Njilla, Chin-Tser Huang
The increasing complexity of modern hardware and software platform along with the imperative assurance on stability deems runtime verification of task fulfillment necessary in distributed systems. Distributing the burden of a central verification monitor to individual devices could improve the efficiency. Our previous work shows the possibility of achieving decentralized runtime verification by incorporating some mechanisms of the blockchain technology for locating the accountability when error occurs. However, traditional blockchain technology disallows branching and hence does not support verification of tasks which involves multiway dependencies. In this paper, we introduce a novel approach of smart marker that can be included in a blockchain to enable multiway branching and merging in order to verify the fulfillment of tasks that involve one-to-many and many-to-one dependencies. The design of smart marker satisfies three requirements of recognizability, compatibility, and authenticability. We implement a prototype of the smart marker scheme and analyze its performance.
现代硬件和软件平台的日益复杂,以及对稳定性的迫切要求,使得分布式系统中任务实现的运行时验证成为必要。将中央验证监视器的负担分配给各个设备可以提高效率。我们之前的工作表明,通过结合区块链技术的一些机制,在错误发生时定位责任,实现去中心化运行时验证的可能性。然而,传统的区块链技术不允许分支,因此不支持对涉及多路依赖关系的任务进行验证。在本文中,我们引入了一种新的智能标记方法,该方法可以包含在区块链中,以支持多路分支和合并,以验证涉及一对多和多对一依赖关系的任务的完成情况。智能标记的设计满足可识别性、兼容性和可认证性三个要求。我们实现了一个智能标记方案的原型,并对其性能进行了分析。
{"title":"Smart Markers in Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for Decentralized Runtime Verification","authors":"Tieming Geng, L. Njilla, Chin-Tser Huang","doi":"10.1109/DSC49826.2021.9346270","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346270","url":null,"abstract":"The increasing complexity of modern hardware and software platform along with the imperative assurance on stability deems runtime verification of task fulfillment necessary in distributed systems. Distributing the burden of a central verification monitor to individual devices could improve the efficiency. Our previous work shows the possibility of achieving decentralized runtime verification by incorporating some mechanisms of the blockchain technology for locating the accountability when error occurs. However, traditional blockchain technology disallows branching and hence does not support verification of tasks which involves multiway dependencies. In this paper, we introduce a novel approach of smart marker that can be included in a blockchain to enable multiway branching and merging in order to verify the fulfillment of tasks that involve one-to-many and many-to-one dependencies. The design of smart marker satisfies three requirements of recognizability, compatibility, and authenticability. We implement a prototype of the smart marker scheme and analyze its performance.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131610198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the Construction of a Post-Quantum Blockchain 后量子b区块链的构建
Pub Date : 2020-12-31 DOI: 10.1109/DSC49826.2021.9346253
Jiahui Chen, Wensheng Gan, Muchuang Hu, Chien‐Ming Chen
Consensus and transaction are the main parts in a blockchain system. However, most cryptographic protocols used in these parts of current blockchains are vulnerable to rapid development of quantum computers. Besides, traditional proof of work (PoW) based consensus protocols such as Bitcoin can not supply memory mining. And the transaction capacity of each block in a blockchain is limited that need to be expanded. In this paper, a new post-quantum poof of work (PoW) consensus algorithm is proposed, which can be used to not only protect the blockchain under the quantum computing attack over existing classical hash based PoW algorithms but also can supply memory mining. Meanwhile, a identity-based post-quantum signature is embed into a transaction process so as to construct lightweight transactions. We thereafter give a detailed description on how the post-quantum lightweight transaction in a blockchain runs. All in all, this work can help to enrich the research on the future post-quantum blockchain (PQB).
共识和交易是区块链系统的主要组成部分。然而,在当前区块链的这些部分中使用的大多数加密协议都容易受到量子计算机快速发展的影响。此外,传统的基于工作量证明(PoW)的共识协议(如比特币)无法提供内存挖掘。而区块链中每个区块的交易能力是有限的,需要扩展。本文提出了一种新的后量子PoW (PoW)共识算法,该算法不仅可以在量子计算攻击下保护区块链,而且可以提供内存挖掘。同时,将基于身份的后量子签名嵌入到交易过程中,构建轻量级交易。之后,我们详细描述了区块链中的后量子轻量级事务是如何运行的。总而言之,这项工作有助于丰富未来后量子区块链(PQB)的研究。
{"title":"On the Construction of a Post-Quantum Blockchain","authors":"Jiahui Chen, Wensheng Gan, Muchuang Hu, Chien‐Ming Chen","doi":"10.1109/DSC49826.2021.9346253","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346253","url":null,"abstract":"Consensus and transaction are the main parts in a blockchain system. However, most cryptographic protocols used in these parts of current blockchains are vulnerable to rapid development of quantum computers. Besides, traditional proof of work (PoW) based consensus protocols such as Bitcoin can not supply memory mining. And the transaction capacity of each block in a blockchain is limited that need to be expanded. In this paper, a new post-quantum poof of work (PoW) consensus algorithm is proposed, which can be used to not only protect the blockchain under the quantum computing attack over existing classical hash based PoW algorithms but also can supply memory mining. Meanwhile, a identity-based post-quantum signature is embed into a transaction process so as to construct lightweight transactions. We thereafter give a detailed description on how the post-quantum lightweight transaction in a blockchain runs. All in all, this work can help to enrich the research on the future post-quantum blockchain (PQB).","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128736784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
DualNet: Locate Then Detect Effective Payload with Deep Attention Network DualNet:定位和检测有效载荷与深度关注网络
Pub Date : 2020-10-23 DOI: 10.1109/DSC49826.2021.9346261
Shiyi Yang, Peilun Wu, Hui Guo
Network intrusion detection (NID) is an essential defense strategy that is used to discover the trace of suspicious user behaviour in large-scale cyberspace, and machine learning (ML), due to its capability of automation and intelligence, has been gradually adopted as a mainstream hunting method in recent years. However, traditional ML based network intrusion detection systems (NIDSs) are not effective to recognize unknown threats and their high detection rate often comes with the cost of high false alarms, which leads to the problem of alarm fatigue. To address the above problems, in this paper, we propose a novel neural network based detection system, DualNet, which is constructed with a general feature extraction stage and a crucial feature learning stage. DualNet can rapidly reuse the spatial-temporal features in accordance with their importance to facilitate the entire learning process and simultaneously mitigate several optimization problems occurred in deep learning (DL). We evaluate the DualNet on two benchmark cyber attack datasets, NSL-KDD and UNSW-NB15. Our experiment shows that DualNet outperforms classical ML based NIDSs and is more effective than existing DL methods for NID in terms of accuracy, detection rate and false alarm rate.
网络入侵检测(NID)是在大规模网络空间中发现可疑用户行为痕迹的重要防御策略,而机器学习(ML)由于其自动化和智能化的能力,近年来逐渐被采用为主流的狩猎方法。然而,传统的基于机器学习的网络入侵检测系统(nids)对未知威胁的识别效果不佳,其高检测率往往伴随着高虚警的代价,从而导致报警疲劳问题。为了解决上述问题,本文提出了一种新的基于神经网络的检测系统DualNet,该系统由一般特征提取阶段和关键特征学习阶段组成。DualNet可以根据其重要性快速重用时空特征,以促进整个学习过程,同时缓解深度学习中出现的一些优化问题。我们在两个基准网络攻击数据集NSL-KDD和UNSW-NB15上对DualNet进行了评估。我们的实验表明,DualNet优于经典的基于ML的nids,并且在准确率、检测率和虚警率方面比现有的DL方法更有效。
{"title":"DualNet: Locate Then Detect Effective Payload with Deep Attention Network","authors":"Shiyi Yang, Peilun Wu, Hui Guo","doi":"10.1109/DSC49826.2021.9346261","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346261","url":null,"abstract":"Network intrusion detection (NID) is an essential defense strategy that is used to discover the trace of suspicious user behaviour in large-scale cyberspace, and machine learning (ML), due to its capability of automation and intelligence, has been gradually adopted as a mainstream hunting method in recent years. However, traditional ML based network intrusion detection systems (NIDSs) are not effective to recognize unknown threats and their high detection rate often comes with the cost of high false alarms, which leads to the problem of alarm fatigue. To address the above problems, in this paper, we propose a novel neural network based detection system, DualNet, which is constructed with a general feature extraction stage and a crucial feature learning stage. DualNet can rapidly reuse the spatial-temporal features in accordance with their importance to facilitate the entire learning process and simultaneously mitigate several optimization problems occurred in deep learning (DL). We evaluate the DualNet on two benchmark cyber attack datasets, NSL-KDD and UNSW-NB15. Our experiment shows that DualNet outperforms classical ML based NIDSs and is more effective than existing DL methods for NID in terms of accuracy, detection rate and false alarm rate.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"7 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114026163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2021 IEEE Conference on Dependable and Secure Computing (DSC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1