首页 > 最新文献

2016 11th Asia Joint Conference on Information Security (AsiaJCIS)最新文献

英文 中文
An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing 云计算中具有灵活系统权限撤销的身份保持访问控制方案
Pub Date : 2016-12-12 DOI: 10.1109/AsiaJCIS.2016.23
Rohit Ahuja, Sraban Kumar Mohanty, K. Sakurai
The advent of cloud computing motivates business organizations to migrate their complex data management systems from local servers to cloud servers for scalable and durable resources on pay per use basis. Considering enormous users and large amount of documents at cloud servers, there is a requirement of an access control scheme, which supports fine-grained cum flexible access control along with "Query-Response" mechanism to enable users to efficiently retrieve desired data from cloud servers. In addition, the scheme should support considerable flexibility to revoke system privileges from user, such as to restrict user from sharing or retrieving data or both, i.e., flexible system privilege revocation and most imperatively to preserve the identity of data owner and consumer, while sharing and retrieving data. Most of the access control schemes in cloud computing till date focus on restricting user from accessing data only. In this paper, we propose an identity preserving access control scheme to simultaneously realize the notion of scalability, fine-grained cum flexible access control, efficient data utilization, identity preserving and flexible system privilege revocation. We extend Ciphertext-Policy Attribute-Set-Based Encryption (CPASBE) in a hierarchical structure of users to achieve scalability. In addition, a hybridization of proxy re-encryption andand CP-ASBE is introduced to materialize the concept of CP-ASBE is introduced to materialize the concept of flexible system privilege revocation. Furthermore, we formally prove the security of our proposed scheme based on decisional bilinear Diffie-Hellman assumption. Efficacy of our scheme is depicted by performing comprehensive experiments.
云计算的出现促使业务组织将其复杂的数据管理系统从本地服务器迁移到云服务器,以获得按使用付费的可扩展和持久资源。考虑到云服务器上的大量用户和大量文档,需要一种访问控制方案,该方案支持细粒度和灵活的访问控制以及“查询-响应”机制,使用户能够有效地从云服务器中检索所需的数据。此外,该方案应该支持相当大的灵活性来撤销用户的系统特权,例如限制用户共享或检索数据,或者两者兼有,即灵活的系统特权撤销,最重要的是在共享和检索数据时保留数据所有者和消费者的身份。迄今为止,云计算中的访问控制方案大多集中在限制用户对数据的访问上。本文提出了一种身份保持访问控制方案,以同时实现可扩展性、细粒度和灵活的访问控制、高效的数据利用、身份保持和灵活的系统特权撤销。我们在用户层次结构中扩展了基于密文-策略属性集的加密(CPASBE),以实现可扩展性。此外,引入了代理重加密和CP-ASBE的混合,实现了CP-ASBE的概念,实现了灵活的系统特权撤销的概念。此外,基于决策双线性Diffie-Hellman假设,我们正式证明了所提方案的安全性。通过综合实验证明了该方案的有效性。
{"title":"An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing","authors":"Rohit Ahuja, Sraban Kumar Mohanty, K. Sakurai","doi":"10.1109/AsiaJCIS.2016.23","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2016.23","url":null,"abstract":"The advent of cloud computing motivates business organizations to migrate their complex data management systems from local servers to cloud servers for scalable and durable resources on pay per use basis. Considering enormous users and large amount of documents at cloud servers, there is a requirement of an access control scheme, which supports fine-grained cum flexible access control along with \"Query-Response\" mechanism to enable users to efficiently retrieve desired data from cloud servers. In addition, the scheme should support considerable flexibility to revoke system privileges from user, such as to restrict user from sharing or retrieving data or both, i.e., flexible system privilege revocation and most imperatively to preserve the identity of data owner and consumer, while sharing and retrieving data. Most of the access control schemes in cloud computing till date focus on restricting user from accessing data only. In this paper, we propose an identity preserving access control scheme to simultaneously realize the notion of scalability, fine-grained cum flexible access control, efficient data utilization, identity preserving and flexible system privilege revocation. We extend Ciphertext-Policy Attribute-Set-Based Encryption (CPASBE) in a hierarchical structure of users to achieve scalability. In addition, a hybridization of proxy re-encryption andand CP-ASBE is introduced to materialize the concept of CP-ASBE is introduced to materialize the concept of flexible system privilege revocation. Furthermore, we formally prove the security of our proposed scheme based on decisional bilinear Diffie-Hellman assumption. Efficacy of our scheme is depicted by performing comprehensive experiments.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124198211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation 一种基于机器学习的ddos攻击检测方法及其性能评估
Pub Date : 2016-08-04 DOI: 10.1109/AsiaJCIS.2016.24
Yuxuan Gao, Yaokai Feng, Junpei Kawamoto, K. Sakurai
DRDoS (Distributed Reflection Denial of Service) attack is a kind of DoS (Denial of Service) attack, in which third-party servers are tricked into sending large amounts of data to the victims. That is, attackers use source address IP spoofing to hide their identity and cause third-parties to send data to the victims as identified by the source address field of the IP packet. This is called reflection because the servers of benign services are tricked into "reflecting" attack traffic to the victims. The most typical existing detection methods of such attacks are designed based on known attacks by protocol and are difficult to detect the unknown ones. According to our investigations, one protocol-independent detection method has been existing, which is based on the assumption that a strong linear relationship exists among the abnormal flows from the reflector to the victim. Moreover, the method is assumed that the all packets from reflectors are attack packets when attacked, which is clearly not reasonable. In this study, we found five features are effective for detecting DRDoS attacks, and we proposed a method to detect DRDoS attacks using these features and machine learning algorithms. Its detection performance is experimentally examined and the experimental result indicates that our proposal is of clearly better detection performance.
DRDoS (Distributed Reflection Denial of Service)攻击是一种DoS (Denial of Service)攻击,通过欺骗第三方服务器向受害者发送大量数据。即攻击者通过源地址IP欺骗来隐藏自己的身份,使第三方根据IP报文的源地址字段来识别攻击者的数据。这被称为反射,因为良性服务的服务器被欺骗,将攻击流量“反射”给受害者。现有最典型的此类攻击检测方法是基于已知的协议攻击设计的,难以检测到未知的攻击。根据我们的研究,一种与协议无关的检测方法已经存在,该方法基于反射器到受害者的异常流之间存在强线性关系的假设。而且,该方法在攻击时假定反射器的所有报文都是攻击报文,这显然是不合理的。在本研究中,我们发现了检测DRDoS攻击有效的五个特征,并提出了一种利用这些特征和机器学习算法检测DRDoS攻击的方法。对其检测性能进行了实验检验,实验结果表明我们的方案具有明显更好的检测性能。
{"title":"A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation","authors":"Yuxuan Gao, Yaokai Feng, Junpei Kawamoto, K. Sakurai","doi":"10.1109/AsiaJCIS.2016.24","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2016.24","url":null,"abstract":"DRDoS (Distributed Reflection Denial of Service) attack is a kind of DoS (Denial of Service) attack, in which third-party servers are tricked into sending large amounts of data to the victims. That is, attackers use source address IP spoofing to hide their identity and cause third-parties to send data to the victims as identified by the source address field of the IP packet. This is called reflection because the servers of benign services are tricked into \"reflecting\" attack traffic to the victims. The most typical existing detection methods of such attacks are designed based on known attacks by protocol and are difficult to detect the unknown ones. According to our investigations, one protocol-independent detection method has been existing, which is based on the assumption that a strong linear relationship exists among the abnormal flows from the reflector to the victim. Moreover, the method is assumed that the all packets from reflectors are attack packets when attacked, which is clearly not reasonable. In this study, we found five features are effective for detecting DRDoS attacks, and we proposed a method to detect DRDoS attacks using these features and machine learning algorithms. Its detection performance is experimentally examined and the experimental result indicates that our proposal is of clearly better detection performance.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134644786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Implementation Experiences and Design Challenges for Resilient SDN Based Secure WAN Overlays 基于弹性SDN的安全广域网覆盖的实现经验和设计挑战
Pub Date : 2016-08-01 DOI: 10.1109/AsiaJCIS.2016.25
Markku Vajaranta, Joona Kannisto, J. Harju
Mobile computing devices, industrial control systems, and service provider clouds often need to be connected to each other over wide area networks. However, reliability, quality of services and confidentiality are challenging in such setups. Moreover, isolated appliances and physical equipment face harsh environment conditions. In this paper we explore designing secure layer 2 overlay networks using Software Defined Networking (SDN), and challenges in implementing them with open source tools.
移动计算设备、工业控制系统和服务提供商云通常需要通过广域网相互连接。然而,在这种设置中,可靠性、服务质量和保密性是具有挑战性的。此外,孤立的电器和物理设备面临恶劣的环境条件。在本文中,我们探讨了使用软件定义网络(SDN)设计安全的第2层覆盖网络,以及使用开源工具实现它们的挑战。
{"title":"Implementation Experiences and Design Challenges for Resilient SDN Based Secure WAN Overlays","authors":"Markku Vajaranta, Joona Kannisto, J. Harju","doi":"10.1109/AsiaJCIS.2016.25","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2016.25","url":null,"abstract":"Mobile computing devices, industrial control systems, and service provider clouds often need to be connected to each other over wide area networks. However, reliability, quality of services and confidentiality are challenging in such setups. Moreover, isolated appliances and physical equipment face harsh environment conditions. In this paper we explore designing secure layer 2 overlay networks using Software Defined Networking (SDN), and challenges in implementing them with open source tools.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"707 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116107591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes 迁移攻击:针对云虚拟机迁移方案的多资源DoS攻击
Pub Date : 2016-08-01 DOI: 10.1109/AsiaJCIS.2016.14
Jia-Rung Yeh, H. Hsiao, Ai-Chun Pang
Live virtual machine (VM) migration is the core technology in elastic cloud computing. With live VM migration, cloud providers can improve resource use and quality of service by adjusting the VM placement on demand. However, live migration is expensive because of high CPU usage and the negative effect on co-located VMs, and frequent live migration thus severely undermines the performance of the cloud. Although existing dynamic allocation schemes are designed to minimize the number of live migrations, this study demonstrated that a denial-of-service adversary can cause excessive live migrations by exploiting dynamic allocation. The attack, which we term migrant attack, deliberately varies the resource usages of a malicious VM to trigger live migration. A crucial feature of the migrant attack is that even if VMs on the same physical machine are perfectly isolated through virtualization, a malicious VM can still affect the availability of the co-located VMs. As proof of concept, we investigated two common VM allocation schemes: load balancing and consolidation. We evaluated the effectiveness of the attack by using both simulations and testbed experiments. We also discuss several potential countermeasures, such as enforcing another layer of isolation between malicious and harmless VMs in dynamic allocation schemes.
动态迁移虚拟机是弹性云计算的核心技术。通过实时虚拟机迁移,云提供商可以根据需要调整虚拟机的位置,从而提高资源使用和服务质量。但是,由于高CPU使用率和对共置vm的负面影响,热迁移的成本很高,频繁的热迁移会严重破坏云的性能。尽管现有的动态分配方案旨在最大限度地减少活动迁移的数量,但本研究表明,拒绝服务攻击者可以通过利用动态分配导致过多的活动迁移。这种攻击,我们称之为迁移攻击,故意改变恶意虚拟机的资源使用,以触发实时迁移。迁移攻击的一个关键特征是,即使同一物理机上的虚拟机通过虚拟化完全隔离,恶意虚拟机仍然可以影响位于同一位置的虚拟机的可用性。作为概念验证,我们研究了两种常见的VM分配方案:负载平衡和整合。我们通过模拟和试验台实验来评估攻击的有效性。我们还讨论了几种潜在的对策,例如在动态分配方案中在恶意和无害vm之间强制另一层隔离。
{"title":"Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes","authors":"Jia-Rung Yeh, H. Hsiao, Ai-Chun Pang","doi":"10.1109/AsiaJCIS.2016.14","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2016.14","url":null,"abstract":"Live virtual machine (VM) migration is the core technology in elastic cloud computing. With live VM migration, cloud providers can improve resource use and quality of service by adjusting the VM placement on demand. However, live migration is expensive because of high CPU usage and the negative effect on co-located VMs, and frequent live migration thus severely undermines the performance of the cloud. Although existing dynamic allocation schemes are designed to minimize the number of live migrations, this study demonstrated that a denial-of-service adversary can cause excessive live migrations by exploiting dynamic allocation. The attack, which we term migrant attack, deliberately varies the resource usages of a malicious VM to trigger live migration. A crucial feature of the migrant attack is that even if VMs on the same physical machine are perfectly isolated through virtualization, a malicious VM can still affect the availability of the co-located VMs. As proof of concept, we investigated two common VM allocation schemes: load balancing and consolidation. We evaluated the effectiveness of the attack by using both simulations and testbed experiments. We also discuss several potential countermeasures, such as enforcing another layer of isolation between malicious and harmless VMs in dynamic allocation schemes.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123400977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Comparing Malware Samples for Unpacking: A Feasibility Study 比较恶意软件样本拆封:可行性研究
Pub Date : 2016-08-01 DOI: 10.1109/AsiaJCIS.2016.28
Ryoichi Isawa, M. Morii, D. Inoue
When an analyst examines the binary of malware to obtain some useful information for defense and mitigation, she is often required to extract its original binary first. Packing is the reason of this. Usually, malware authors pack (encrypt and/or compress) their malware to hinder code analysis, making it necessary for analysts to spend a great deal of time on unpacking. Towards effective malware analysis, this paper presents an automated original-entry-point detector called OEPdet. If the original entry point (OEP) of malware is found after the malware is executed, an analyst can smoothly begin to examine the original binary starting at the OEP. OEPdet takes as input two malware samples to find part of the original binary shared between those samples. It then detects the OEP based on that shared binary. This is based on the fact that many malware samples are often generated with a variety of source code shared with others at function or snippet granularity. The experiments using some malware samples confirm OEPdet is feasible to detect the OEP.
当分析人员检查恶意软件的二进制文件以获得一些用于防御和缓解的有用信息时,通常需要首先提取其原始二进制文件。包装是原因。通常,恶意软件作者打包(加密和/或压缩)他们的恶意软件来阻碍代码分析,这使得分析人员有必要花费大量时间来解包。为了有效地分析恶意软件,本文提出了一种称为OEPdet的自动原始入口点检测器。如果在恶意软件执行后找到了恶意软件的原始入口点(OEP),那么分析人员可以顺利地从OEP开始检查原始二进制文件。OEPdet将两个恶意软件样本作为输入,以查找这些样本之间共享的原始二进制文件的一部分。然后,它根据共享二进制文件检测OEP。这是基于这样一个事实,即许多恶意软件样本通常是用各种源代码生成的,这些源代码在功能或代码片段粒度上与他人共享。通过对恶意软件样本的实验,验证了OEPdet检测OEP的可行性。
{"title":"Comparing Malware Samples for Unpacking: A Feasibility Study","authors":"Ryoichi Isawa, M. Morii, D. Inoue","doi":"10.1109/AsiaJCIS.2016.28","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2016.28","url":null,"abstract":"When an analyst examines the binary of malware to obtain some useful information for defense and mitigation, she is often required to extract its original binary first. Packing is the reason of this. Usually, malware authors pack (encrypt and/or compress) their malware to hinder code analysis, making it necessary for analysts to spend a great deal of time on unpacking. Towards effective malware analysis, this paper presents an automated original-entry-point detector called OEPdet. If the original entry point (OEP) of malware is found after the malware is executed, an analyst can smoothly begin to examine the original binary starting at the OEP. OEPdet takes as input two malware samples to find part of the original binary shared between those samples. It then detects the OEP based on that shared binary. This is based on the fact that many malware samples are often generated with a variety of source code shared with others at function or snippet granularity. The experiments using some malware samples confirm OEPdet is feasible to detect the OEP.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114084157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Novel Design of Fair Exchange Protocol for Semi-trusted Server and Its Application in Cloud Environment 半可信服务器公平交换协议的新设计及其在云环境中的应用
Pub Date : 2016-08-01 DOI: 10.1109/AsiaJCIS.2016.22
Chih-Hung Wang, Chien-Ming Wang
The messages can be exchanged in a fair manner if after the protocol, both exchanging parties can simultaneously obtain their desired messages or none of them can get useful information. Since the network communication is time consuming, the major approach for this issue is to develop a off-line trusted third party (off-line TTP) which gets involved into the exchange procedure only if at least one party is dishonest for delivering her/his messages. This paper focuses on a new design for the semi-trusted server that can be easily implemented and eliminates the assumption of private channel between the two parties compared with Franklin and Reiter's approach. Furthermore, this kind of design can also be used for the encrypted message fair exchange in cloud computing environment, that is, if two parties want to exchange the messages stored in cloud with encrypted forms, the TTP then acts as a proxy server to help them by fair re-encryptions of these two ciphertexts in an efficient way.
在协议之后,如果交换双方都能同时获得自己想要的消息,或者任何一方都不能获得有用的信息,则可以公平地交换消息。由于网络通信是耗时的,因此解决这个问题的主要方法是开发一个离线可信第三方(离线TTP),该第三方只有在至少一方不诚实地传递她/他的消息时才会参与交换过程。与Franklin和Reiter的方法相比,本文重点研究了一种易于实现的半可信服务器的新设计,并且消除了双方之间私有通道的假设。此外,这种设计还可以用于云计算环境下的加密消息公平交换,即如果双方希望以加密形式交换存储在云中的消息,则由http作为代理服务器,通过对这两个密文进行有效的公平再加密来帮助他们。
{"title":"Novel Design of Fair Exchange Protocol for Semi-trusted Server and Its Application in Cloud Environment","authors":"Chih-Hung Wang, Chien-Ming Wang","doi":"10.1109/AsiaJCIS.2016.22","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2016.22","url":null,"abstract":"The messages can be exchanged in a fair manner if after the protocol, both exchanging parties can simultaneously obtain their desired messages or none of them can get useful information. Since the network communication is time consuming, the major approach for this issue is to develop a off-line trusted third party (off-line TTP) which gets involved into the exchange procedure only if at least one party is dishonest for delivering her/his messages. This paper focuses on a new design for the semi-trusted server that can be easily implemented and eliminates the assumption of private channel between the two parties compared with Franklin and Reiter's approach. Furthermore, this kind of design can also be used for the encrypted message fair exchange in cloud computing environment, that is, if two parties want to exchange the messages stored in cloud with encrypted forms, the TTP then acts as a proxy server to help them by fair re-encryptions of these two ciphertexts in an efficient way.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130426022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Integration of Multi-modal Features for Android Malware Detection Using Linear SVM 基于线性支持向量机的Android恶意软件检测多模态特征集成
Pub Date : 2016-08-01 DOI: 10.1109/AsiaJCIS.2016.29
Tao Ban, Takeshi Takahashi, Shanqing Guo, D. Inoue, K. Nakao
In light of the rapid growth of malware threats towards the Android platform, there is a pressing need to develop effective solutions. In this paper we explorate the potential of multi-modal features to enhance the detection accuracy while keep the false alarms low. Examined features include the permissions, Application Programming Interface (API) calls, and meta features such as the category information and Application Package (APK) descriptions. These multi-modal features are coded in a way to facilitate efficient learning and testing with the particular classifiers known as the linear support vector machine (SVM). Experiments show that our proposed method can obtain an accuracy more than 94%, over performing the conventional methods by a large margin. By employing high-performance learning tools, the training and testing can be done in a very time-efficient fashion for large scale and high-dimensional data.
鉴于针对Android平台的恶意软件威胁的快速增长,迫切需要开发有效的解决方案。在本文中,我们探索了多模态特征的潜力,以提高检测精度,同时保持低误报。检查的功能包括权限、应用程序编程接口(API)调用和元功能,如类别信息和应用程序包(APK)描述。这些多模态特征的编码方式便于使用称为线性支持向量机(SVM)的特定分类器进行有效的学习和测试。实验结果表明,该方法的准确率达到94%以上,大大优于传统方法。通过使用高性能学习工具,可以以非常省时的方式对大规模和高维数据进行训练和测试。
{"title":"Integration of Multi-modal Features for Android Malware Detection Using Linear SVM","authors":"Tao Ban, Takeshi Takahashi, Shanqing Guo, D. Inoue, K. Nakao","doi":"10.1109/AsiaJCIS.2016.29","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2016.29","url":null,"abstract":"In light of the rapid growth of malware threats towards the Android platform, there is a pressing need to develop effective solutions. In this paper we explorate the potential of multi-modal features to enhance the detection accuracy while keep the false alarms low. Examined features include the permissions, Application Programming Interface (API) calls, and meta features such as the category information and Application Package (APK) descriptions. These multi-modal features are coded in a way to facilitate efficient learning and testing with the particular classifiers known as the linear support vector machine (SVM). Experiments show that our proposed method can obtain an accuracy more than 94%, over performing the conventional methods by a large margin. By employing high-performance learning tools, the training and testing can be done in a very time-efficient fashion for large scale and high-dimensional data.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124825151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
An Improvement Data Hiding Scheme Based on Formula Fully Exploiting Modification Directions and Pixel Value Differencing Method 一种基于公式的改进数据隐藏方案,充分利用修正方向和像素值差分法
Pub Date : 2016-08-01 DOI: 10.1109/AsiaJCIS.2016.20
W. Kuo, Jyun-Jia Li, Chun-Cheng Wang, Lih-Chyau Wuu, Yu-Chih Huang
Recently, a modified data hiding scheme based on pixel value differencing and improving exploiting modification directions is proposed by Shen and Huang. There are two major contributions in this scheme. One is to enhance the embedding rate and good embedding capacity and the other is an optimization problem used to solve the overflow/ underflow problem. In fact, they propose the similar brute force method to solve overflow/underflow problem in their proposed scheme. To overcome the overflow/underflow problem exactly, we will propose the close form to solve this problem in this paper. Then, an improvement data hiding scheme based on FFEMD (Formula Fully Exploiting Modification Directions) and pixel value differencing method is proposed. According to our analysis, it is not only to keep the advantages of Shen-Huang scheme but also to use the close form to solve the overflow/ underflow problem.
最近,Shen和Huang提出了一种基于像素值差异和改进挖掘修改方向的改进数据隐藏方案。在这个方案中有两个主要贡献。一个是提高埋设率和良好的埋设能力,另一个是解决溢流/底流问题的优化问题。实际上,在他们提出的方案中,他们提出了类似的蛮力方法来解决溢流/底流问题。为了准确地克服溢流/下流问题,本文将提出封闭形式来解决这一问题。然后,提出了一种基于FFEMD (Formula Fully exploitation Modification direction)和像素值差分法的改进数据隐藏方案。根据我们的分析,既要保留深黄方案的优点,又要采用封闭的形式来解决溢流/底流问题。
{"title":"An Improvement Data Hiding Scheme Based on Formula Fully Exploiting Modification Directions and Pixel Value Differencing Method","authors":"W. Kuo, Jyun-Jia Li, Chun-Cheng Wang, Lih-Chyau Wuu, Yu-Chih Huang","doi":"10.1109/AsiaJCIS.2016.20","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2016.20","url":null,"abstract":"Recently, a modified data hiding scheme based on pixel value differencing and improving exploiting modification directions is proposed by Shen and Huang. There are two major contributions in this scheme. One is to enhance the embedding rate and good embedding capacity and the other is an optimization problem used to solve the overflow/ underflow problem. In fact, they propose the similar brute force method to solve overflow/underflow problem in their proposed scheme. To overcome the overflow/underflow problem exactly, we will propose the close form to solve this problem in this paper. Then, an improvement data hiding scheme based on FFEMD (Formula Fully Exploiting Modification Directions) and pixel value differencing method is proposed. According to our analysis, it is not only to keep the advantages of Shen-Huang scheme but also to use the close form to solve the overflow/ underflow problem.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124947480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Defense Joint Attacks Based on Stochastic Discrete Sequence Anomaly Detection 基于随机离散序列异常检测的联合攻击防御
Pub Date : 2016-08-01 DOI: 10.1109/AsiaJCIS.2016.18
Chia-Mei Chen, G. Lai, P. Young
To evade detection, hackers may use a botnet, a set of compromised machines, to attempt to gain the access of a target and the bot machines report the results to the command and control server after the instructed attack has been performed. As the machines which explore or attempt login to the target might be captured and blocked by the defense mechanism installed in the network, the hacker would use another clean zombie machine to login the target using the access information collected by the botnet. Such attack sequence is called "Scouts-and-Commander" joint attack, where scouts take charge of scanning and exploring the vulnerability of a target and commander launches the precise strike using the correct login information provided by scouts. The detection system would consider the access normal, it is hard to identify such collaborative attack. In order to identify the attack sequence, this study correlates network information and system logs to find the attack sequence and identifies the potential scouts and commanders in the early stage before real damage has been done. In this paper, hidden Markov model often used to describe sequential data is adopted to forecast possible joint attacks and to prevent real damage. The experimental results show that the proposed defense mechanism can identify the joint attacks in the early stage efficiently to prevent further damage in the networks.
为了逃避检测,黑客可能会使用僵尸网络,一组受感染的机器,试图获得目标的访问权限,并且在指示攻击执行后,僵尸机器将结果报告给命令和控制服务器。由于探索或试图登录目标的机器可能会被网络中安装的防御机制捕获和阻止,黑客会使用另一台干净的僵尸机利用僵尸网络收集的访问信息登录目标。这种攻击顺序被称为“侦察兵-指挥官”联合攻击,侦察兵负责扫描和探测目标的漏洞,指挥官利用侦察兵提供的正确登录信息进行精确打击。检测系统会认为接入正常,很难识别出这种协同攻击。为了识别攻击序列,本研究将网络信息与系统日志相关联,找到攻击序列,并在实际损害造成之前的早期识别潜在的侦察兵和指挥员。本文采用描述序列数据常用的隐马尔可夫模型来预测可能的联合攻击,防止实际损害。实验结果表明,该防御机制能够在早期有效识别联合攻击,防止网络进一步受损。
{"title":"Defense Joint Attacks Based on Stochastic Discrete Sequence Anomaly Detection","authors":"Chia-Mei Chen, G. Lai, P. Young","doi":"10.1109/AsiaJCIS.2016.18","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2016.18","url":null,"abstract":"To evade detection, hackers may use a botnet, a set of compromised machines, to attempt to gain the access of a target and the bot machines report the results to the command and control server after the instructed attack has been performed. As the machines which explore or attempt login to the target might be captured and blocked by the defense mechanism installed in the network, the hacker would use another clean zombie machine to login the target using the access information collected by the botnet. Such attack sequence is called \"Scouts-and-Commander\" joint attack, where scouts take charge of scanning and exploring the vulnerability of a target and commander launches the precise strike using the correct login information provided by scouts. The detection system would consider the access normal, it is hard to identify such collaborative attack. In order to identify the attack sequence, this study correlates network information and system logs to find the attack sequence and identifies the potential scouts and commanders in the early stage before real damage has been done. In this paper, hidden Markov model often used to describe sequential data is adopted to forecast possible joint attacks and to prevent real damage. The experimental results show that the proposed defense mechanism can identify the joint attacks in the early stage efficiently to prevent further damage in the networks.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133873963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Wamber: Defending Web Sites on Hosting Services with Self-Learning Honeypots Wamber:用自我学习蜜罐保护托管服务的网站
Pub Date : 2016-08-01 DOI: 10.1109/AsiaJCIS.2016.32
Satomi Saito, S. Torii, K. Yoshioka, Tsutomu Matsumoto
Web sites have been great diversity because of their purposes and structures today and many web sites are working on hosting services. A hosting service is one of the network services for outsourcing construction and maintenance of the servers. Thus, the web site operators are free from hardware setting and server maintenance. On the other hand, web sites have been exposed to cyber attacks. To counter those web site attacks, hosting service providers should monitor their web sites. However, in many cases, it is difficult for the service providers to analyze such attacks with full information because of contracts about a protection of personal information. As another approach, it is effective to construct server side honeypots and observe malicious access to them. Unfortunately, honeypots could not always observe all type of attacks because of the diversity of web sites. In this paper, we propose a novel approach for keeping up security intelligence and strengthening countermeasures against web attacks on a hosting service. Our approach helps the service providers to protect their customers web sites by combining the analysis of IDS logs and web access logs provided from these sites and dedicated honeypots for observing web attacks. The honeypots keep learning interactions from the actual hosted sites, and attract attackers by mimicking the sites to gain the intelligence on malicious web attacks. We also describe the case study in a hosting service on our university, in which suspicious requests are confirmed to be malicious by our approach.
由于其目的和结构的不同,今天的网站已经变得非常多样化,许多网站都在从事托管服务。托管服务是外包服务器建设和维护的网络服务之一。因此,网站运营者无需进行硬件设置和服务器维护。另一方面,网站也受到了网络攻击。为了对抗这些网站攻击,托管服务提供商应该监控他们的网站。然而,在许多情况下,由于有关个人信息保护的合同,服务提供商很难在拥有完整信息的情况下分析此类攻击。作为另一种方法,构建服务器端蜜罐并观察恶意访问是有效的。不幸的是,由于网站的多样性,蜜罐不能总是观察到所有类型的攻击。在本文中,我们提出了一种新的方法来保持安全情报和加强对主机服务的web攻击的对策。我们的方法结合了对这些网站提供的IDS日志和web访问日志的分析,以及用于观察web攻击的专用蜜罐,帮助服务提供商保护他们的客户网站。蜜罐不断学习实际托管站点的交互,并通过模仿这些站点来吸引攻击者,从而获得恶意web攻击的情报。我们还描述了在我们大学的托管服务中的案例研究,其中可疑请求通过我们的方法被确认为恶意请求。
{"title":"Wamber: Defending Web Sites on Hosting Services with Self-Learning Honeypots","authors":"Satomi Saito, S. Torii, K. Yoshioka, Tsutomu Matsumoto","doi":"10.1109/AsiaJCIS.2016.32","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2016.32","url":null,"abstract":"Web sites have been great diversity because of their purposes and structures today and many web sites are working on hosting services. A hosting service is one of the network services for outsourcing construction and maintenance of the servers. Thus, the web site operators are free from hardware setting and server maintenance. On the other hand, web sites have been exposed to cyber attacks. To counter those web site attacks, hosting service providers should monitor their web sites. However, in many cases, it is difficult for the service providers to analyze such attacks with full information because of contracts about a protection of personal information. As another approach, it is effective to construct server side honeypots and observe malicious access to them. Unfortunately, honeypots could not always observe all type of attacks because of the diversity of web sites. In this paper, we propose a novel approach for keeping up security intelligence and strengthening countermeasures against web attacks on a hosting service. Our approach helps the service providers to protect their customers web sites by combining the analysis of IDS logs and web access logs provided from these sites and dedicated honeypots for observing web attacks. The honeypots keep learning interactions from the actual hosted sites, and attract attackers by mimicking the sites to gain the intelligence on malicious web attacks. We also describe the case study in a hosting service on our university, in which suspicious requests are confirmed to be malicious by our approach.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"200 1-2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120921997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2016 11th Asia Joint Conference on Information Security (AsiaJCIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1