首页 > 最新文献

Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001最新文献

英文 中文
Graph-based authentication of digital streams 基于图形的数字流认证
Pub Date : 2001-05-14 DOI: 10.1109/SECPRI.2001.924301
Sara Miner More, Jessica Staddon
We consider the authentication of digital streams over a lossy network. The overall approach taken is graph-based, as this yields simple methods for controlling overhead, delay, and the ability to authenticate, while serving to unify many previously known hash- and MAC-based techniques. The loss pattern of the network is defined probabilistically, allowing both bursty and random packet loss to be modeled. Our authentication schemes are customizable by the sender of the stream; that is, within reasonable constraints on the input parameters, we provide schemes that achieve the desired authentication probability while meeting the input upper bound on the overhead per packet. In addition, we demonstrate that some of the shortcomings of previously known schemes correspond to easily identifiable properties of a graph, and hence, may be more easily avoided by taking a graph-based approach to designing authentication schemes.
我们考虑了在有损网络上的数字流的认证。采用的总体方法是基于图的,因为这产生了控制开销、延迟和身份验证能力的简单方法,同时有助于统一许多以前已知的基于散列和mac的技术。网络的丢失模式是按概率定义的,允许对突发和随机丢包进行建模。我们的认证方案可以由流的发送方定制;也就是说,在对输入参数的合理约束下,我们提供了在满足每个数据包开销的输入上限的情况下实现所需认证概率的方案。此外,我们证明了以前已知方案的一些缺点对应于图的易于识别的属性,因此,通过采用基于图的方法来设计身份验证方案可以更容易地避免。
{"title":"Graph-based authentication of digital streams","authors":"Sara Miner More, Jessica Staddon","doi":"10.1109/SECPRI.2001.924301","DOIUrl":"https://doi.org/10.1109/SECPRI.2001.924301","url":null,"abstract":"We consider the authentication of digital streams over a lossy network. The overall approach taken is graph-based, as this yields simple methods for controlling overhead, delay, and the ability to authenticate, while serving to unify many previously known hash- and MAC-based techniques. The loss pattern of the network is defined probabilistically, allowing both bursty and random packet loss to be modeled. Our authentication schemes are customizable by the sender of the stream; that is, within reasonable constraints on the input parameters, we provide schemes that achieve the desired authentication probability while meeting the input upper bound on the overhead per packet. In addition, we demonstrate that some of the shortcomings of previously known schemes correspond to easily identifiable properties of a graph, and hence, may be more easily avoided by taking a graph-based approach to designing authentication schemes.","PeriodicalId":20502,"journal":{"name":"Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001","volume":"176 1","pages":"232-246"},"PeriodicalIF":0.0,"publicationDate":"2001-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86806175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 171
Information-theoretic measures for anomaly detection 异常检测的信息论方法
Pub Date : 2001-05-14 DOI: 10.1109/SECPRI.2001.924294
Wenke Lee, Dong Xiang
Anomaly detection is an essential component of protection mechanisms against novel attacks. We propose to use several information-theoretic measures, namely, entropy, conditional entropy, relative conditional entropy, information gain, and information cost for anomaly detection. These measures can be used to describe the characteristics of an audit data set, suggest the appropriate anomaly detection model(s) to be built, and explain the performance of the model(s). We use case studies on Unix system call data, BSM data, and network tcpdump data to illustrate the utilities of these measures.
异常检测是防范新型攻击的重要组成部分。我们建议使用几个信息理论度量,即熵、条件熵、相对条件熵、信息增益和信息成本来进行异常检测。这些度量可用于描述审计数据集的特征,建议要构建的适当异常检测模型,并解释模型的性能。我们使用Unix系统调用数据、BSM数据和网络tcpdump数据的案例研究来说明这些度量的实用程序。
{"title":"Information-theoretic measures for anomaly detection","authors":"Wenke Lee, Dong Xiang","doi":"10.1109/SECPRI.2001.924294","DOIUrl":"https://doi.org/10.1109/SECPRI.2001.924294","url":null,"abstract":"Anomaly detection is an essential component of protection mechanisms against novel attacks. We propose to use several information-theoretic measures, namely, entropy, conditional entropy, relative conditional entropy, information gain, and information cost for anomaly detection. These measures can be used to describe the characteristics of an audit data set, suggest the appropriate anomaly detection model(s) to be built, and explain the performance of the model(s). We use case studies on Unix system call data, BSM data, and network tcpdump data to illustrate the utilities of these measures.","PeriodicalId":20502,"journal":{"name":"Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001","volume":"47 1","pages":"130-143"},"PeriodicalIF":0.0,"publicationDate":"2001-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86324206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 638
A fast automaton-based method for detecting anomalous program behaviors 一种基于快速自动机的异常程序行为检测方法
Pub Date : 2001-05-14 DOI: 10.1109/SECPRI.2001.924295
R. Sekar, M. Bendre, Dinakar Dhurjati, P. Bollineni
Anomaly detection on system call sequences has become perhaps the most successful approach for detecting novel intrusions. A natural way for learning sequences is to use a finite-state automaton (FSA). However previous research indicates that FSA-learning is computationally expensive, that it cannot be completely automated or that the space usage of the FSA may be excessive. We present a new approach that overcomes these difficulties. Our approach builds a compact FSA in a fully automatic and efficient manner, without requiring access to source code for programs. The space requirements for the FSA is low - of the order of a few kilobytes for typical programs. The FSA uses only a constant time per system call during the learning as well as the detection period. This factor leads to low overheads for intrusion detection. Unlike many of the previous techniques, our FSA-technique can capture both short term and long term temporal relationships among system calls, and thus perform more accurate detection. This enables our approach to generalize and predict future behaviors from past behaviors. As a result, the training periods needed for our FSA based approach are shorter. Moreover false positives are reduced without increasing the likelihood of missing attacks. This paper describes our FSA based technique and presents a comprehensive experimental evaluation of the technique.
对系统调用序列进行异常检测可能已经成为检测新型入侵最成功的方法。学习序列的自然方法是使用有限状态自动机(FSA)。然而,先前的研究表明,FSA学习在计算上是昂贵的,它不能完全自动化,或者FSA的空间使用可能过多。我们提出了一种克服这些困难的新方法。我们的方法以全自动和高效的方式构建了一个紧凑的FSA,而不需要访问程序的源代码。对FSA的空间要求很低——对于典型的程序来说只有几千字节。FSA在学习和检测期间每个系统调用只使用恒定的时间。这一因素降低了入侵检测的开销。与以前的许多技术不同,我们的fsa技术可以捕获系统调用之间的短期和长期时间关系,从而执行更准确的检测。这使我们的方法能够从过去的行为中概括和预测未来的行为。因此,我们基于FSA的方法所需的培训时间更短。此外,在不增加错过攻击的可能性的情况下,减少了误报。本文描述了我们基于FSA的技术,并对该技术进行了全面的实验评估。
{"title":"A fast automaton-based method for detecting anomalous program behaviors","authors":"R. Sekar, M. Bendre, Dinakar Dhurjati, P. Bollineni","doi":"10.1109/SECPRI.2001.924295","DOIUrl":"https://doi.org/10.1109/SECPRI.2001.924295","url":null,"abstract":"Anomaly detection on system call sequences has become perhaps the most successful approach for detecting novel intrusions. A natural way for learning sequences is to use a finite-state automaton (FSA). However previous research indicates that FSA-learning is computationally expensive, that it cannot be completely automated or that the space usage of the FSA may be excessive. We present a new approach that overcomes these difficulties. Our approach builds a compact FSA in a fully automatic and efficient manner, without requiring access to source code for programs. The space requirements for the FSA is low - of the order of a few kilobytes for typical programs. The FSA uses only a constant time per system call during the learning as well as the detection period. This factor leads to low overheads for intrusion detection. Unlike many of the previous techniques, our FSA-technique can capture both short term and long term temporal relationships among system calls, and thus perform more accurate detection. This enables our approach to generalize and predict future behaviors from past behaviors. As a result, the training periods needed for our FSA based approach are shorter. Moreover false positives are reduced without increasing the likelihood of missing attacks. This paper describes our FSA based technique and presents a comprehensive experimental evaluation of the technique.","PeriodicalId":20502,"journal":{"name":"Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001","volume":"2 4 1","pages":"144-155"},"PeriodicalIF":0.0,"publicationDate":"2001-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89158561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 639
Cryptographic key generation from voice 从语音生成加密密钥
Pub Date : 2001-05-14 DOI: 10.1109/SECPRI.2001.924299
F. Monrose, M. Reiter, Qi Li, S. Wetzel
We propose a technique to reliably generate a cryptographic key from a user's voice while speaking a password. The key resists cryptanalysis even against an attacker who captures all system information related to generating or verifying the cryptographic key. Moreover, the technique is sufficiently robust to enable the user to reliably regenerate the key by uttering her password again. We describe an empirical evaluation of this technique using 250 utterances recorded from 50 users.
我们提出了一种可靠地从用户说出密码时的声音生成加密密钥的技术。即使攻击者捕获了与生成或验证加密密钥相关的所有系统信息,密钥也能抵抗密码分析。此外,该技术具有足够的健壮性,使用户能够通过再次输入密码来可靠地重新生成密钥。我们使用来自50个用户的250个话语描述了对该技术的经验评估。
{"title":"Cryptographic key generation from voice","authors":"F. Monrose, M. Reiter, Qi Li, S. Wetzel","doi":"10.1109/SECPRI.2001.924299","DOIUrl":"https://doi.org/10.1109/SECPRI.2001.924299","url":null,"abstract":"We propose a technique to reliably generate a cryptographic key from a user's voice while speaking a password. The key resists cryptanalysis even against an attacker who captures all system information related to generating or verifying the cryptographic key. Moreover, the technique is sufficiently robust to enable the user to reliably regenerate the key by uttering her password again. We describe an empirical evaluation of this technique using 250 utterances recorded from 50 users.","PeriodicalId":20502,"journal":{"name":"Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001","volume":"8 1","pages":"202-213"},"PeriodicalIF":0.0,"publicationDate":"2001-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89576628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 383
On confidentiality and algorithms: programming under the constraints of noninterference 机密性与算法:非干扰约束下的程序设计
Pub Date : 2001-05-14 DOI: 10.1109/SECPRI.2001.924288
Johan Agat, David Sands
Recent interest in methods for certifying programs for secure information flow (noninterference) have failed to raise a key question: can efficient algorithms be written so as to satisfy the requirements of secure information flow? We discuss how algorithms for searching and sorting can be adapted to work on collections of secret data without leaking any confidential information, either directly, indirectly, or through timing behaviour. We pay particular attention to the issue of timing channels caused by cache behaviour and argue that it is necessary to disable the affect of the cache in order to construct algorithms manipulating pointers to objects in such a way that they satisfy the conditions of noninterference. We also discuss how randomisation can be used to implement secure algorithms, and discuss how randomised hash tables might be made practically secure.
最近对安全信息流(不干扰)程序认证方法的兴趣未能提出一个关键问题:是否可以编写有效的算法以满足安全信息流的要求?我们将讨论如何调整搜索和排序算法来处理机密数据集合,而不会直接、间接或通过定时行为泄露任何机密信息。我们特别关注由缓存行为引起的定时通道问题,并认为有必要禁用缓存的影响,以便构建以满足非干扰条件的方式操作对象指针的算法。我们还讨论了如何使用随机化来实现安全算法,并讨论了如何使随机哈希表实际上是安全的。
{"title":"On confidentiality and algorithms: programming under the constraints of noninterference","authors":"Johan Agat, David Sands","doi":"10.1109/SECPRI.2001.924288","DOIUrl":"https://doi.org/10.1109/SECPRI.2001.924288","url":null,"abstract":"Recent interest in methods for certifying programs for secure information flow (noninterference) have failed to raise a key question: can efficient algorithms be written so as to satisfy the requirements of secure information flow? We discuss how algorithms for searching and sorting can be adapted to work on collections of secret data without leaking any confidential information, either directly, indirectly, or through timing behaviour. We pay particular attention to the issue of timing channels caused by cache behaviour and argue that it is necessary to disable the affect of the cache in order to construct algorithms manipulating pointers to objects in such a way that they satisfy the conditions of noninterference. We also discuss how randomisation can be used to implement secure algorithms, and discuss how randomised hash tables might be made practically secure.","PeriodicalId":20502,"journal":{"name":"Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001","volume":"14 1","pages":"64-77"},"PeriodicalIF":0.0,"publicationDate":"2001-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91256969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Intrusion detection via static analysis 通过静态分析进行入侵检测
Pub Date : 2001-05-14 DOI: 10.1109/SECPRI.2001.924296
D. Wagner, Drew Dean
One of the primary challenges in intrusion detection is modelling typical application behavior so that we can recognize attacks by their atypical effects without raising too many false alarms. We show how static analysis may be used to automatically derive a model of application behavior. The result is a host-based intrusion detection system with three advantages: a high degree of automation, protection against a broad class of attacks based on corrupted code, and the elimination of false alarms. We report on our experience with a prototype implementation of this technique.
入侵检测的主要挑战之一是对典型的应用程序行为进行建模,以便我们能够根据其非典型效果识别攻击,而不会引起太多的假警报。我们将展示如何使用静态分析来自动派生应用程序行为模型。其结果是基于主机的入侵检测系统具有三个优点:高度自动化,防止基于损坏代码的各种攻击,消除假警报。我们将报告我们使用该技术的原型实现的经验。
{"title":"Intrusion detection via static analysis","authors":"D. Wagner, Drew Dean","doi":"10.1109/SECPRI.2001.924296","DOIUrl":"https://doi.org/10.1109/SECPRI.2001.924296","url":null,"abstract":"One of the primary challenges in intrusion detection is modelling typical application behavior so that we can recognize attacks by their atypical effects without raising too many false alarms. We show how static analysis may be used to automatically derive a model of application behavior. The result is a host-based intrusion detection system with three advantages: a high degree of automation, protection against a broad class of attacks based on corrupted code, and the elimination of false alarms. We report on our experience with a prototype implementation of this technique.","PeriodicalId":20502,"journal":{"name":"Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001","volume":"38 1","pages":"156-168"},"PeriodicalIF":0.0,"publicationDate":"2001-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76240401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 773
Protection of keys against modification attack 保护密钥免受修改攻击
Pub Date : 2001-05-14 DOI: 10.1109/SECPRI.2001.924285
W. W. Fung, M. Golin, J. W. Gray
Anderson and Kuhn (1997) described an attack against tamper-resistant devices wherein a secret key stored in EEPROM is compromised using a simple and low-cost attack. The attack consists of setting bits in the EEPROM using low-cost probes and observing the effect on the output of the device. These attacks are extremely general, as they apply to virtually any cryptosystem. The objective of the present work is to explore cryptographic techniques with the goal of raising the cost (in terms of time and money) of carrying out the EEPROM modification attack by Class I attackers, at least to a point where it is as prohibitive as the cost of purchasing more expensive equipment. We propose the m-permutation protection scheme in which the key will be encoded in a special way and burned into the EEPROM of the device. To attack the scheme, the attacker needs to be able to solve for K in the equation K=/spl oplus//sub i=1//sup m/P/sub i/ in which P/sub i/'s are unknown. It is observed that the m-permutation protection scheme does not distribute the key K uniformly. Analysis shows that m=3 or m=5 are already good enough practically to provide strong security if the encoding is done properly and that m>5 may not give significant improvement to the security of the scheme.
Anderson和Kuhn(1997)描述了一种针对防篡改设备的攻击,其中存储在EEPROM中的密钥使用简单且低成本的攻击被破坏。攻击包括使用低成本探针在EEPROM中设置位并观察对设备输出的影响。这些攻击非常普遍,因为它们几乎适用于任何密码系统。目前工作的目标是探索加密技术,目的是提高I类攻击者进行EEPROM修改攻击的成本(在时间和金钱方面),至少达到与购买更昂贵设备的成本一样令人望而却步的程度。我们提出了m-置换保护方案,该方案将密钥以特殊的方式编码并刻录到器件的EEPROM中。要攻击该方案,攻击者需要能够解出等式K=/spl + //下标i=1//sup m/P/下标i/中的K,其中P/下标i/是未知的。观察到m-置换保护方案不能均匀地分配密钥K。分析表明,m=3或m=5实际上已经足够好,如果编码正确,可以提供很强的安全性,而m>5可能不会显著提高方案的安全性。
{"title":"Protection of keys against modification attack","authors":"W. W. Fung, M. Golin, J. W. Gray","doi":"10.1109/SECPRI.2001.924285","DOIUrl":"https://doi.org/10.1109/SECPRI.2001.924285","url":null,"abstract":"Anderson and Kuhn (1997) described an attack against tamper-resistant devices wherein a secret key stored in EEPROM is compromised using a simple and low-cost attack. The attack consists of setting bits in the EEPROM using low-cost probes and observing the effect on the output of the device. These attacks are extremely general, as they apply to virtually any cryptosystem. The objective of the present work is to explore cryptographic techniques with the goal of raising the cost (in terms of time and money) of carrying out the EEPROM modification attack by Class I attackers, at least to a point where it is as prohibitive as the cost of purchasing more expensive equipment. We propose the m-permutation protection scheme in which the key will be encoded in a special way and burned into the EEPROM of the device. To attack the scheme, the attacker needs to be able to solve for K in the equation K=/spl oplus//sub i=1//sup m/P/sub i/ in which P/sub i/'s are unknown. It is observed that the m-permutation protection scheme does not distribute the key K uniformly. Analysis shows that m=3 or m=5 are already good enough practically to provide strong security if the encoding is done properly and that m>5 may not give significant improvement to the security of the scheme.","PeriodicalId":20502,"journal":{"name":"Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001","volume":"42 1","pages":"26-36"},"PeriodicalIF":0.0,"publicationDate":"2001-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79992716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A model for asynchronous reactive systems and its application to secure message transmission 异步响应系统模型及其在消息安全传输中的应用
Pub Date : 2001-05-14 DOI: 10.1109/SECPRI.2001.924298
B. Pfitzmann, M. Waidner
We present a rigorous model for secure reactive systems in asynchronous networks with a sound cryptographic semantics, supporting abstract specifications and the composition of secure systems. This enables modular proofs of security, which is essential in bridging the gap between the rigorous proof techniques of cryptography and tool-supported formal proof techniques. The model follows the general simulatability approach of modern cryptography. A variety of network structures and trust models can be described such as static and adaptive adversaries, some examples of this are given. As an example of our specification methodology we provide an abstract and complete specification for Secure Message Transmission, improving on recent results by Lynch (1999), and verify one concrete implementation. Our proof is based on a general theorem on the security of encryption in a reactive multi-user setting, generalizing a recent result by Bellare et. al (2000).
我们提出了异步网络中安全响应系统的严格模型,该模型具有良好的加密语义,支持抽象规范和安全系统的组成。这使得安全性的模块化证明成为可能,这对于弥合密码学的严格证明技术和工具支持的正式证明技术之间的差距至关重要。该模型遵循现代密码学的一般可仿真方法。可以描述各种网络结构和信任模型,如静态对手和自适应对手,并给出了一些例子。作为规范方法的一个例子,我们为安全消息传输提供了一个抽象而完整的规范,改进了Lynch(1999)最近的结果,并验证了一个具体的实现。我们的证明是基于响应式多用户设置中加密安全性的一般定理,推广了Bellare等人(2000)最近的结果。
{"title":"A model for asynchronous reactive systems and its application to secure message transmission","authors":"B. Pfitzmann, M. Waidner","doi":"10.1109/SECPRI.2001.924298","DOIUrl":"https://doi.org/10.1109/SECPRI.2001.924298","url":null,"abstract":"We present a rigorous model for secure reactive systems in asynchronous networks with a sound cryptographic semantics, supporting abstract specifications and the composition of secure systems. This enables modular proofs of security, which is essential in bridging the gap between the rigorous proof techniques of cryptography and tool-supported formal proof techniques. The model follows the general simulatability approach of modern cryptography. A variety of network structures and trust models can be described such as static and adaptive adversaries, some examples of this are given. As an example of our specification methodology we provide an abstract and complete specification for Secure Message Transmission, improving on recent results by Lynch (1999), and verify one concrete implementation. Our proof is based on a general theorem on the security of encryption in a reactive multi-user setting, generalizing a recent result by Bellare et. al (2000).","PeriodicalId":20502,"journal":{"name":"Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001","volume":"100 1","pages":"184-200"},"PeriodicalIF":0.0,"publicationDate":"2001-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86223460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 391
Evaluation of intrusion detectors: a decision theory approach 入侵探测器的评估:决策理论方法
Pub Date : 2001-05-14 DOI: 10.1109/SECPRI.2001.924287
J. Gaffney, J. Ulvila
We present a method of analysis for evaluating intrusion detection systems. The method can be used to compare the performance of intrusion detectors, to evaluate performance goals for intrusion detectors, and to determine the best configuration of an intrusion detector for a given environment. The method uses a decision analysis that integrates and extends ROC (receiver operating characteristics) and cost analysis methods to provide an expected cost metric. We provide general results and illustrate the method in several numerical examples that cover a range of detectors that meet a performance goal and two actual detectors operating in a realistic environment. We demonstrate that, contrary to common advice, the value of an intrusion detection system and the optimal operation of that system depend not only on the system's ROC curve, but also on cost metrics and the hostility of the operating environment as summarized by the probability of intrusion. Extensions of the method are outlined, and conclusions are drawn.
提出了一种评估入侵检测系统的分析方法。该方法可用于比较入侵探测器的性能,评估入侵探测器的性能目标,并确定给定环境下入侵探测器的最佳配置。该方法使用集成并扩展ROC(接受者操作特征)和成本分析方法的决策分析,以提供预期的成本度量。我们提供了一般结果,并在几个数值示例中说明了该方法,这些示例涵盖了满足性能目标的一系列检测器和在现实环境中运行的两个实际检测器。我们证明,与通常的建议相反,入侵检测系统的价值和该系统的最佳运行不仅取决于系统的ROC曲线,还取决于成本指标和由入侵概率总结的操作环境的敌意。概述了该方法的扩展,并得出了结论。
{"title":"Evaluation of intrusion detectors: a decision theory approach","authors":"J. Gaffney, J. Ulvila","doi":"10.1109/SECPRI.2001.924287","DOIUrl":"https://doi.org/10.1109/SECPRI.2001.924287","url":null,"abstract":"We present a method of analysis for evaluating intrusion detection systems. The method can be used to compare the performance of intrusion detectors, to evaluate performance goals for intrusion detectors, and to determine the best configuration of an intrusion detector for a given environment. The method uses a decision analysis that integrates and extends ROC (receiver operating characteristics) and cost analysis methods to provide an expected cost metric. We provide general results and illustrate the method in several numerical examples that cover a range of detectors that meet a performance goal and two actual detectors operating in a realistic environment. We demonstrate that, contrary to common advice, the value of an intrusion detection system and the optimal operation of that system depend not only on the system's ROC curve, but also on cost metrics and the hostility of the operating environment as summarized by the probability of intrusion. Extensions of the method are outlined, and conclusions are drawn.","PeriodicalId":20502,"journal":{"name":"Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001","volume":"102 1","pages":"50-61"},"PeriodicalIF":0.0,"publicationDate":"2001-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76106454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 148
Cryptographic security for mobile code 移动代码的加密安全性
Pub Date : 2001-05-14 DOI: 10.1109/SECPRI.2001.924283
Joy Algesheimer, C. Cachin, J. Camenisch, G. Karjoth
We address the protection of mobile code against cheating and potentially malicious hosts. We point out that the recent approach based on computing with "encrypted functions" is limited to the case where only the code originator learns the result of the completion and the host running the code must not notice anything at all. We argue that if the host is to receive some output of the computation, then securing mobile code requires minimal trust in a third party. Tamper-proof hardware installed on each host has been proposed for this purpose. We introduce a new approach for securely executing (fragments of) mobile code that relies on a minimally trusted third party. This party is a generic independent entity, called the secure computation service, which performs some operations on behalf of the mobile application, but does not learn anything about the encrypted computation. Because it is universal, the secure computation service needs to be only minimally trusted and can serve many different applications. We present a protocol based on tools from theoretical cryptography that is quite practical for computing small functions.
我们解决了移动代码的保护,防止作弊和潜在的恶意主机。我们指出,最近基于“加密函数”计算的方法仅限于只有代码发起者知道补全结果,而运行代码的主机绝对不会注意到任何事情的情况。我们认为,如果主机要接收计算的一些输出,那么确保移动代码的安全需要对第三方的最小信任。为此,建议在每台主机上安装防篡改硬件。我们引入了一种新的方法来安全执行(片段)依赖于最低限度信任的第三方的移动代码。这一方是一个通用的独立实体,称为安全计算服务,它代表移动应用程序执行一些操作,但不了解任何关于加密计算的信息。因为它是通用的,所以安全计算服务只需要得到最低限度的信任,并且可以服务于许多不同的应用程序。我们提出了一种基于理论密码学工具的协议,它对于计算小函数非常实用。
{"title":"Cryptographic security for mobile code","authors":"Joy Algesheimer, C. Cachin, J. Camenisch, G. Karjoth","doi":"10.1109/SECPRI.2001.924283","DOIUrl":"https://doi.org/10.1109/SECPRI.2001.924283","url":null,"abstract":"We address the protection of mobile code against cheating and potentially malicious hosts. We point out that the recent approach based on computing with \"encrypted functions\" is limited to the case where only the code originator learns the result of the completion and the host running the code must not notice anything at all. We argue that if the host is to receive some output of the computation, then securing mobile code requires minimal trust in a third party. Tamper-proof hardware installed on each host has been proposed for this purpose. We introduce a new approach for securely executing (fragments of) mobile code that relies on a minimally trusted third party. This party is a generic independent entity, called the secure computation service, which performs some operations on behalf of the mobile application, but does not learn anything about the encrypted computation. Because it is universal, the secure computation service needs to be only minimally trusted and can serve many different applications. We present a protocol based on tools from theoretical cryptography that is quite practical for computing small functions.","PeriodicalId":20502,"journal":{"name":"Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001","volume":"6 1","pages":"2-11"},"PeriodicalIF":0.0,"publicationDate":"2001-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85804513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 142
期刊
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1