首页 > 最新文献

Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization最新文献

英文 中文
Universal Witness Signatures 通用证人签名
Chen Qian, Mehdi Tibouchi, R. Géraud
{"title":"Universal Witness Signatures","authors":"Chen Qian, Mehdi Tibouchi, R. Géraud","doi":"10.1007/978-3-319-97916-8_20","DOIUrl":"https://doi.org/10.1007/978-3-319-97916-8_20","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"39 1","pages":"313-329"},"PeriodicalIF":0.0,"publicationDate":"2018-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75715556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting Privacy Information Abuse by Android Apps from API Call Logs 从API调用日志中检测Android应用程序滥用隐私信息
Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada
{"title":"Detecting Privacy Information Abuse by Android Apps from API Call Logs","authors":"Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada","doi":"10.1007/978-3-319-97916-8_10","DOIUrl":"https://doi.org/10.1007/978-3-319-97916-8_10","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"16 1","pages":"143-157"},"PeriodicalIF":0.0,"publicationDate":"2018-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78789902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK 夸克的类符号计算与条件差分密码分析
Jingchun Yang, Meicheng Liu, D. Lin, Wenhao Wang
{"title":"Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK","authors":"Jingchun Yang, Meicheng Liu, D. Lin, Wenhao Wang","doi":"10.1007/978-3-319-97916-8_16","DOIUrl":"https://doi.org/10.1007/978-3-319-97916-8_16","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"8 1","pages":"244-261"},"PeriodicalIF":0.0,"publicationDate":"2018-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81666815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques 基于嵌入技术求解带误差广义学习问题的估计代价
Weiyao Wang, Yuntao Wang, Atsushi Takayasu, T. Takagi
{"title":"Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques","authors":"Weiyao Wang, Yuntao Wang, Atsushi Takayasu, T. Takagi","doi":"10.1007/978-3-319-97916-8_6","DOIUrl":"https://doi.org/10.1007/978-3-319-97916-8_6","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"49 1","pages":"87-103"},"PeriodicalIF":0.0,"publicationDate":"2018-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80956442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
(Short Paper) How to Solve DLOG Problem with Auxiliary Input (短文)如何用辅助输入解决DLOG问题
Akinaga Ueda, Hayato Tada, K. Kurosawa
{"title":"(Short Paper) How to Solve DLOG Problem with Auxiliary Input","authors":"Akinaga Ueda, Hayato Tada, K. Kurosawa","doi":"10.1007/978-3-319-97916-8_7","DOIUrl":"https://doi.org/10.1007/978-3-319-97916-8_7","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"15 1","pages":"104-113"},"PeriodicalIF":0.0,"publicationDate":"2018-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89624353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges and Preparedness of SDN-based Firewalls 基于sdn的防火墙的挑战和准备
V. Dixit, Sukwha Kyung, Ziming Zhao, Adam Doupé, Yan Shoshitaishvili, Gail-Joon Ahn
Software-Defined Network (SDN) is a novel architecture created to address the issues of traditional and vertically integrated networks. To increase cost-effectiveness and enable logical control, SDN provides high programmability and centralized view of the network through separation of network traffic delivery (the "data plane") from network configuration (the "control plane"). SDN controllers and related protocols are rapidly evolving to address the demands for scaling in complex enterprise networks. Because of the evolution of modern SDN technologies, production networks employing SDN are prone to several security vulnerabilities. The rate at which SDN frameworks are evolving continues to overtake attempts to address their security issues. According to our study, existing defense mechanisms, particularly SDN-based firewalls, face new and SDN-specific challenges in successfully enforcing security policies in the underlying network. In this paper, we identify problems associated with SDN-based firewalls, such as ambiguous flow path calculations and poor scalability in large networks. We survey existing SDN-based firewall designs and their shortcomings in protecting a dynamically scaling network like a data center. We extend our study by evaluating one such SDN-specific security solution called FlowGuard, and identifying new attack vectors and vulnerabilities. We also present corresponding threat detection techniques and respective mitigation strategies.
软件定义网络(SDN)是一种新的体系结构,旨在解决传统和垂直集成网络的问题。为了提高成本效益和实现逻辑控制,SDN通过将网络流量交付(“数据平面”)与网络配置(“控制平面”)分离,提供了高可编程性和集中的网络视图。SDN控制器和相关协议正在迅速发展,以满足复杂企业网络的扩展需求。由于现代SDN技术的发展,采用SDN的生产网络容易出现一些安全漏洞。SDN框架的发展速度继续超过解决其安全问题的尝试。根据我们的研究,现有的防御机制,特别是基于sdn的防火墙,在成功地在底层网络中执行安全策略时,面临着新的和sdn特有的挑战。在本文中,我们确定了与基于sdn的防火墙相关的问题,例如模糊的流路径计算和大型网络中较差的可扩展性。我们调查了现有的基于sdn的防火墙设计及其在保护动态扩展网络(如数据中心)方面的缺点。我们通过评估一种名为FlowGuard的sdn特定安全解决方案来扩展我们的研究,并识别新的攻击媒介和漏洞。我们还提出了相应的威胁检测技术和相应的缓解策略。
{"title":"Challenges and Preparedness of SDN-based Firewalls","authors":"V. Dixit, Sukwha Kyung, Ziming Zhao, Adam Doupé, Yan Shoshitaishvili, Gail-Joon Ahn","doi":"10.1145/3180465.3180468","DOIUrl":"https://doi.org/10.1145/3180465.3180468","url":null,"abstract":"Software-Defined Network (SDN) is a novel architecture created to address the issues of traditional and vertically integrated networks. To increase cost-effectiveness and enable logical control, SDN provides high programmability and centralized view of the network through separation of network traffic delivery (the \"data plane\") from network configuration (the \"control plane\"). SDN controllers and related protocols are rapidly evolving to address the demands for scaling in complex enterprise networks. Because of the evolution of modern SDN technologies, production networks employing SDN are prone to several security vulnerabilities. The rate at which SDN frameworks are evolving continues to overtake attempts to address their security issues. According to our study, existing defense mechanisms, particularly SDN-based firewalls, face new and SDN-specific challenges in successfully enforcing security policies in the underlying network. In this paper, we identify problems associated with SDN-based firewalls, such as ambiguous flow path calculations and poor scalability in large networks. We survey existing SDN-based firewall designs and their shortcomings in protecting a dynamically scaling network like a data center. We extend our study by evaluating one such SDN-specific security solution called FlowGuard, and identifying new attack vectors and vulnerabilities. We also present corresponding threat detection techniques and respective mitigation strategies.","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81412242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Internet Security Liberated via Software Defined Exchanges 通过软件定义的交换解放互联网安全
Kuang-Ching Wang, R. Brooks, C. Barrineau, Jon Oakley, Lu Yu, Qing Wang
With software defined networking and network function virtualization technologies, networks can be programmed to have customized processing and paths for different traffic at manageable costs and for massive numbers of applications. Now, picture a future Internet where each entity - a person, an organization, or an autonomous system - has the ability to choose how traffic in their respective network sessions is routed and processed between itself and its counterparts. The network is, essentially, liberated from today's homogeneous IP-based routing and limited connection options. To realize such a network paradigm, we propose a software defined exchange architecture that can provide the needed network programmability, session-level customization, and scale. We present a case study for traffic-analysis-resistant communication among individuals, campuses, or web services, where IP addresses no longer need to have a one-to-one correspondence with service providers.
通过软件定义的网络和网络功能虚拟化技术,可以对网络进行编程,以可管理的成本和大量应用程序为不同的流量提供定制的处理和路径。现在,想象一下未来的互联网,其中每个实体——一个人、一个组织或一个自治系统——都有能力选择如何在各自的网络会话中路由和处理自己与对应的网络会话中的流量。从本质上讲,该网络从当今同质的基于ip的路由和有限的连接选项中解放出来。为了实现这样一个网络范例,我们提出了一个软件定义的交换体系结构,它可以提供所需的网络可编程性、会话级定制和可扩展性。我们提出了一个案例研究,在个人、校园或web服务之间进行流量分析抵抗通信,其中IP地址不再需要与服务提供商进行一对一的通信。
{"title":"Internet Security Liberated via Software Defined Exchanges","authors":"Kuang-Ching Wang, R. Brooks, C. Barrineau, Jon Oakley, Lu Yu, Qing Wang","doi":"10.1145/3180465.3180475","DOIUrl":"https://doi.org/10.1145/3180465.3180475","url":null,"abstract":"With software defined networking and network function virtualization technologies, networks can be programmed to have customized processing and paths for different traffic at manageable costs and for massive numbers of applications. Now, picture a future Internet where each entity - a person, an organization, or an autonomous system - has the ability to choose how traffic in their respective network sessions is routed and processed between itself and its counterparts. The network is, essentially, liberated from today's homogeneous IP-based routing and limited connection options. To realize such a network paradigm, we propose a software defined exchange architecture that can provide the needed network programmability, session-level customization, and scale. We present a case study for traffic-analysis-resistant communication among individuals, campuses, or web services, where IP addresses no longer need to have a one-to-one correspondence with service providers.","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"85 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80956054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Machine Learning-Based Detection of Ransomware Using SDN 基于SDN的机器学习勒索软件检测
Greg Cusack, Oliver Michel, Eric Keller
The growth of malware poses a major threat to internet users, governments, and businesses around the world. One of the major types of malware, ransomware, encrypts a user's sensitive information and only returns the original files to the user after a ransom is paid. As malware developers shift the delivery of their product from HTTP to HTTPS to protect themselves from payload inspection, we can no longer rely on deep packet inspection to extract features for malware identification. Toward this goal, we propose a solution leveraging a recent trend in networking hardware, that is programmable forwarding engines (PFEs). PFEs allow collection of per-packet, network monitoring data at high rates. We use this data to monitor the network traffic between an infected computer and the command and control (C&C) server. We extract high-level flow features from this traffic and use this data for ransomware classification. We write a stream processor and use a random forest, binary classifier to utilizes these rich flow records in fingerprinting malicious, network activity without the requirement of deep packet inspection. Our classification model achieves a detection rate in excess of 0.86, while maintaining a false negative rate under 0.11. Our results suggest that a flow-based fingerprinting method is feasible and accurate enough to catch ransomware before encryption.
恶意软件的增长对世界各地的互联网用户、政府和企业构成了重大威胁。勒索软件是恶意软件的主要类型之一,它会加密用户的敏感信息,只有在支付赎金后才会将原始文件返回给用户。随着恶意软件开发人员将其产品的交付从HTTP转移到HTTPS,以保护自己免受有效负载检查的影响,我们不能再依赖深度数据包检测来提取恶意软件识别的特征。为了实现这一目标,我们提出了一种利用网络硬件最新趋势的解决方案,即可编程转发引擎(pfe)。pfe允许以高速率收集每个数据包和网络监控数据。我们使用这些数据来监控受感染计算机与命令和控制(C&C)服务器之间的网络流量。我们从这些流量中提取高级流特征,并使用这些数据进行勒索软件分类。我们编写了一个流处理器,并使用随机森林、二值分类器来利用这些丰富的流记录在不需要深度包检测的情况下识别恶意网络活动。我们的分类模型实现了超过0.86的检测率,同时保持了0.11以下的假阴性率。我们的研究结果表明,基于流量的指纹识别方法是可行的,并且足够准确,可以在加密之前捕获勒索软件。
{"title":"Machine Learning-Based Detection of Ransomware Using SDN","authors":"Greg Cusack, Oliver Michel, Eric Keller","doi":"10.1145/3180465.3180467","DOIUrl":"https://doi.org/10.1145/3180465.3180467","url":null,"abstract":"The growth of malware poses a major threat to internet users, governments, and businesses around the world. One of the major types of malware, ransomware, encrypts a user's sensitive information and only returns the original files to the user after a ransom is paid. As malware developers shift the delivery of their product from HTTP to HTTPS to protect themselves from payload inspection, we can no longer rely on deep packet inspection to extract features for malware identification. Toward this goal, we propose a solution leveraging a recent trend in networking hardware, that is programmable forwarding engines (PFEs). PFEs allow collection of per-packet, network monitoring data at high rates. We use this data to monitor the network traffic between an infected computer and the command and control (C&C) server. We extract high-level flow features from this traffic and use this data for ransomware classification. We write a stream processor and use a random forest, binary classifier to utilizes these rich flow records in fingerprinting malicious, network activity without the requirement of deep packet inspection. Our classification model achieves a detection rate in excess of 0.86, while maintaining a false negative rate under 0.11. Our results suggest that a flow-based fingerprinting method is feasible and accurate enough to catch ransomware before encryption.","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"72 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86275608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Dressed up: Baiting Attackers through Endpoint Service Projection 伪装:通过端点服务投影引诱攻击者
M. Stoecklin, Jialong Zhang, F. Araujo, Teryl Taylor
Honeypots have been widely employed to track attackers' activities and divert potential threats against real assets. A critical challenge of honeypot research is how to better integrate deceptive honeypots as part of an overall production network. Conventional honeypots are typically deployed as separate assets near those they are protecting---they are not in the direct line of fire. Such a setup does not effectively protect real assets since attackers do not require a full network scan to identify certain production hosts. In this paper, we present a novel framework to transparently project vulnerable honey services atop real production systems without interfering the production system. The key idea is to use SDN technology to divide a production network into segments of production and decoy servers. Traffic intended for production workloads is redirected to decoys based on port or service information. The decoy servers run "vulnerable" services that are heavily monitored. From the attackers' perspective, these vulnerable services run on production systems, but traffic is instead relayed to a honeypot with the same configuration (e.g., IP address, MAC address, running services) of the protected production system. In this way, our approach capitalizes on capturing attacks before they reach protected assets. We demonstrate its feasibility with a prototype implementation and practical deployment model. Evaluation shows that our approach incurs negligible overhead and resists potential side channel fingerprinting attacks.
蜜罐已被广泛用于跟踪攻击者的活动,并将潜在威胁转移到实际资产上。蜜罐研究的一个关键挑战是如何更好地将欺骗性蜜罐集成为整个生产网络的一部分。传统的蜜罐通常作为单独的资产部署在它们所保护的目标附近,它们不在直接的火力范围内。这样的设置不能有效地保护真正的资产,因为攻击者不需要完整的网络扫描来识别某些生产主机。在本文中,我们提出了一个新的框架,透明地项目脆弱的蜂蜜服务在真实的生产系统之上,而不干扰生产系统。关键思想是使用SDN技术将生产网络划分为生产服务器和诱饵服务器段。用于生产工作负载的流量根据端口或服务信息被重定向到诱饵。诱饵服务器运行“易受攻击”的服务,这些服务受到严密监控。从攻击者的角度来看,这些易受攻击的服务运行在生产系统上,但流量被转发到具有与受保护的生产系统相同配置(例如IP地址、MAC地址、正在运行的服务)的蜜罐。通过这种方式,我们的方法利用了在攻击到达受保护资产之前捕获攻击的优势。通过原型实现和实际部署模型验证了其可行性。评估表明,我们的方法可以忽略不计开销,并抵抗潜在的侧信道指纹攻击。
{"title":"Dressed up: Baiting Attackers through Endpoint Service Projection","authors":"M. Stoecklin, Jialong Zhang, F. Araujo, Teryl Taylor","doi":"10.1145/3180465.3180466","DOIUrl":"https://doi.org/10.1145/3180465.3180466","url":null,"abstract":"Honeypots have been widely employed to track attackers' activities and divert potential threats against real assets. A critical challenge of honeypot research is how to better integrate deceptive honeypots as part of an overall production network. Conventional honeypots are typically deployed as separate assets near those they are protecting---they are not in the direct line of fire. Such a setup does not effectively protect real assets since attackers do not require a full network scan to identify certain production hosts. In this paper, we present a novel framework to transparently project vulnerable honey services atop real production systems without interfering the production system. The key idea is to use SDN technology to divide a production network into segments of production and decoy servers. Traffic intended for production workloads is redirected to decoys based on port or service information. The decoy servers run \"vulnerable\" services that are heavily monitored. From the attackers' perspective, these vulnerable services run on production systems, but traffic is instead relayed to a honeypot with the same configuration (e.g., IP address, MAC address, running services) of the protected production system. In this way, our approach capitalizes on capturing attacks before they reach protected assets. We demonstrate its feasibility with a prototype implementation and practical deployment model. Evaluation shows that our approach incurs negligible overhead and resists potential side channel fingerprinting attacks.","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"136 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79642151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cybersecurity Challenges and Opportunities in the New "Edge Computing + IoT" World “边缘计算+物联网”新时代的网络安全挑战与机遇
Jianli Pan, Zhicheng Yang
The paradigm shift to the Internet of Things (IoT) and the emergence of the edge computing concept have brought huge potentials for various future IoT application scenes such as smart home, smart transportation, smart health, smart grids, and smart energy. It also brings a series of new Cybersecurity challenges. We envision that many new research and innovation opportunities will emerge in the conjunction of "Cybersecurity + edge computing + IoT + AI". In this article, we will discuss the major new Cybersecurity challenges and the related opportunities in such a vision.
物联网(IoT)的范式转变和边缘计算概念的出现,为智能家居、智能交通、智能健康、智能电网、智能能源等未来各种物联网应用场景带来了巨大潜力。这也带来了一系列新的网络安全挑战。我们预计,在“网络安全+边缘计算+物联网+人工智能”的结合下,将出现许多新的研究和创新机会。在这篇文章中,我们将讨论网络安全面临的主要新挑战和相关机遇。
{"title":"Cybersecurity Challenges and Opportunities in the New \"Edge Computing + IoT\" World","authors":"Jianli Pan, Zhicheng Yang","doi":"10.1145/3180465.3180470","DOIUrl":"https://doi.org/10.1145/3180465.3180470","url":null,"abstract":"The paradigm shift to the Internet of Things (IoT) and the emergence of the edge computing concept have brought huge potentials for various future IoT application scenes such as smart home, smart transportation, smart health, smart grids, and smart energy. It also brings a series of new Cybersecurity challenges. We envision that many new research and innovation opportunities will emerge in the conjunction of \"Cybersecurity + edge computing + IoT + AI\". In this article, we will discuss the major new Cybersecurity challenges and the related opportunities in such a vision.","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86796024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
期刊
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1