首页 > 最新文献

2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)最新文献

英文 中文
Dynamic flow redirecton scheme for enhancing control plane robustness in SDN 一种增强SDN控制平面鲁棒性的动态流量重定向方案
Dong Liang, Qinrang Liu, Yanbin Hu, Tao Hu, Binghao Yan, Haiming Zhao
In SDN, the controller is the core and is responsible for processing all flow requests of the network switches. However, due to the sudden occurrence and unbalanced distribution of flows in the network, it is likely that some controllers suffer workload that is far heavier than their load capacity, which leads to the failure of the controller and further leads to the paralysis of the entire network. To solve this problem, we propose a dynamic flow redirection scheme (DFR) to prevent network crash. We describe the phenomenon of controller failure caused by numerous flow requests. The flow redirection is formalized as a multi-objective optimization problem and constrained by flow table and bandwidth. We prove that the problem is NP-hard. We solve this problem with the dynamic flow redirection approach (DFR). First, state detection module detects whether the current flow requests will exceed the controller load. The Flow Redirection Assignment Module then computes the redirect path for the redundant flow request. Finally, Rule Dispense issues the flow rules to the corresponding switches. Simulation results show that DFR reduces network latency and reduces the overload probability of controllers by at least 3 times.
在SDN中,控制器是核心,负责处理网络交换机的所有流请求。但是,由于网络中流量的突然性和分布不均衡,很可能会导致一些控制器承受的工作量远远超过其负载能力,从而导致控制器失效,进而导致整个网络瘫痪。为了解决这个问题,我们提出了一种动态流量重定向方案(DFR)来防止网络崩溃。我们描述了由大量流请求引起的控制器故障现象。将流重定向形式化为一个多目标优化问题,并受流表和带宽的约束。我们证明了这个问题是np困难的。我们用动态流重定向方法(DFR)解决了这个问题。首先,状态检测模块检测当前流量请求是否会超过控制器负载。然后,流重定向分配模块计算冗余流请求的重定向路径。最后,规则分发将流规则发送到相应的交换机。仿真结果表明,DFR降低了网络延迟,将控制器的过载概率降低了至少3倍。
{"title":"Dynamic flow redirecton scheme for enhancing control plane robustness in SDN","authors":"Dong Liang, Qinrang Liu, Yanbin Hu, Tao Hu, Binghao Yan, Haiming Zhao","doi":"10.1109/TrustCom50675.2020.00182","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00182","url":null,"abstract":"In SDN, the controller is the core and is responsible for processing all flow requests of the network switches. However, due to the sudden occurrence and unbalanced distribution of flows in the network, it is likely that some controllers suffer workload that is far heavier than their load capacity, which leads to the failure of the controller and further leads to the paralysis of the entire network. To solve this problem, we propose a dynamic flow redirection scheme (DFR) to prevent network crash. We describe the phenomenon of controller failure caused by numerous flow requests. The flow redirection is formalized as a multi-objective optimization problem and constrained by flow table and bandwidth. We prove that the problem is NP-hard. We solve this problem with the dynamic flow redirection approach (DFR). First, state detection module detects whether the current flow requests will exceed the controller load. The Flow Redirection Assignment Module then computes the redirect path for the redundant flow request. Finally, Rule Dispense issues the flow rules to the corresponding switches. Simulation results show that DFR reduces network latency and reduces the overload probability of controllers by at least 3 times.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134276071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust 基于多级信任的协同入侵检测对内部攻击的增强
Wenjuan Li, W. Meng, Huimin Zhu
With the speedy growth of distributed networks such as Internet of Things (IoT), there is an increasing need to protect network security against various attacks by deploying collaborative intrusion detection systems (CIDSs), which allow different detector nodes to exchange required information and data with each other. While due to the distributed architecture, insider attacks are a big threat for CIDSs, in which an attacker can reside inside the network. To address this issue, designing an appropriate trust management scheme is considered as an effective solution. In this work, we first analyze the development of CIDSs in the past decades and identify the major challenges on building an effective trust management scheme. Then we introduce a generic framework aiming to enhance the security of CIDSs against advanced insider threats by deriving multilevel trust. In the study, our results demonstrate the viability and the effectiveness of our framework.
随着物联网(IoT)等分布式网络的快速发展,越来越需要通过部署协作入侵检测系统(cids)来保护网络安全免受各种攻击,该系统允许不同的检测节点相互交换所需的信息和数据。然而,由于分布式架构,内部攻击是cids的一大威胁,攻击者可以驻留在网络内部。为了解决这个问题,设计一个合适的信任管理方案被认为是一个有效的解决方案。在这项工作中,我们首先分析了过去几十年CIDSs的发展,并确定了建立有效信任管理方案的主要挑战。然后,我们引入了一个通用框架,旨在通过派生多级信任来增强cids的安全性,以抵御高级内部威胁。在研究中,我们的结果证明了我们的框架的可行性和有效性。
{"title":"Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust","authors":"Wenjuan Li, W. Meng, Huimin Zhu","doi":"10.1109/TrustCom50675.2020.00158","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00158","url":null,"abstract":"With the speedy growth of distributed networks such as Internet of Things (IoT), there is an increasing need to protect network security against various attacks by deploying collaborative intrusion detection systems (CIDSs), which allow different detector nodes to exchange required information and data with each other. While due to the distributed architecture, insider attacks are a big threat for CIDSs, in which an attacker can reside inside the network. To address this issue, designing an appropriate trust management scheme is considered as an effective solution. In this work, we first analyze the development of CIDSs in the past decades and identify the major challenges on building an effective trust management scheme. Then we introduce a generic framework aiming to enhance the security of CIDSs against advanced insider threats by deriving multilevel trust. In the study, our results demonstrate the viability and the effectiveness of our framework.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134475491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive Random Test Case Generation Based on Multi-Objective Evolutionary Search 基于多目标进化搜索的自适应随机测试用例生成
Chengying Mao, Linlin Wen, T. Chen
Diversity is the key factor for test cases to detect program failures. Adaptive random testing (ART) is one of the effective methods to improve the diversity of test cases. Being an ART algorithm, the evolutionary adaptive random testing (eAR) only increases the distance between test cases to enhance its failure detection ability. This paper presents a new ART algorithm, MoesART, based on multi-objective evolutionary search. In this algorithm, in addition to the dispersion diversity, two other new diversities (or optimization objectives) are designed from the perspectives of the balance and proportionality of test cases. Then, the Pareto optimal solution returned by the NSGA-II framework is used as the next test case. In the experiments, the typical block failure pattern in the cases of two-dimensional and three-dimensional input domains is used to validate the effectiveness of the proposed MoesART algorithm. The experimental results show that MoesART exhibits better failure detection ability than both eAR and the fixed-sized-candidate-set ART (FSCS-ART), especially for the programs with three-dimensional input domain.
多样性是测试用例检测程序故障的关键因素。自适应随机测试(ART)是提高测试用例多样性的有效方法之一。进化自适应随机测试算法(eAR)作为一种ART算法,通过增加测试用例之间的距离来增强其故障检测能力。提出了一种新的基于多目标进化搜索的ART算法MoesART。在该算法中,除了色散分集之外,还从测试用例的平衡性和比例性的角度设计了另外两个新的分集(或优化目标)。然后,将NSGA-II框架返回的Pareto最优解作为下一个测试用例。在实验中,采用二维和三维输入域的典型块失效模式来验证所提出的MoesART算法的有效性。实验结果表明,MoesART具有比eAR和固定大小候选集ART (FSCS-ART)更好的故障检测能力,特别是对于具有三维输入域的程序。
{"title":"Adaptive Random Test Case Generation Based on Multi-Objective Evolutionary Search","authors":"Chengying Mao, Linlin Wen, T. Chen","doi":"10.1109/TrustCom50675.2020.00020","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00020","url":null,"abstract":"Diversity is the key factor for test cases to detect program failures. Adaptive random testing (ART) is one of the effective methods to improve the diversity of test cases. Being an ART algorithm, the evolutionary adaptive random testing (eAR) only increases the distance between test cases to enhance its failure detection ability. This paper presents a new ART algorithm, MoesART, based on multi-objective evolutionary search. In this algorithm, in addition to the dispersion diversity, two other new diversities (or optimization objectives) are designed from the perspectives of the balance and proportionality of test cases. Then, the Pareto optimal solution returned by the NSGA-II framework is used as the next test case. In the experiments, the typical block failure pattern in the cases of two-dimensional and three-dimensional input domains is used to validate the effectiveness of the proposed MoesART algorithm. The experimental results show that MoesART exhibits better failure detection ability than both eAR and the fixed-sized-candidate-set ART (FSCS-ART), especially for the programs with three-dimensional input domain.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132628421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Online Game Malicious Chargeback by using k-NN 基于k-NN的网络游戏恶意退款检测
Yu-Chih Wei, You-Xin Lai, Hai-Po Su, Yu-Wen Yen
It has been estimated that the global gaming market is worth nearly US$150 billion. Its consumer chargeback services often end up being used by some online gamers as a tool to commit fraud, causing a huge adverse impact on the industry. A gaming company in Taiwan found itself falling victim of malicious chargeback fraud. Nearly NT$10 million of fraudulent chargebacks were made during the period from January to April 2019 alone, making a huge dent in the revenue of the company. To counter chargeback fraud, some gaming companies resorted to manually checking for and blocking malicious accounts of their users, incurring huge labor cost in the process. Manual checking might have alleviated the problems to some extent; however, when new games came online, gaming companies would see a surge of malicious chargebacks, causing subsequent exponential increases in losses. To help reduce labor cost incurred by manual account checking, potential human errors and potential losses that may be caused by malicious chargebacks, this study proposed a k-NN model to detect malicious chargebacks by analysing online gamers' transactional records and gameplay data. The numbers of times and the amounts of prepayment, the numbers of times of chargebacks, and the times of the transactions that the gamers of our study gaming company made were used as characteristics for our k-NN model. The use of these characteristics enabled us to score a minimum of 0.81 in F1-Measure. In addition, three SMOTE (Synthetic Minority Over-sampling Technique) sampling methods were used to deal with the imbalance data provided by our study company and improve the F1-Measure of our proposed k-NN model (scoring up to 0.89 in our experiments). It is hoped that the use of our k-NN model can help reduce potential losses of online gaming companies that may be caused by malicious chargeback fraud, deter to malicious gamers against illegal gains, and prevent the online gaming ecosystem from being sabotaged by malicious chargebacks.
据估计,全球游戏市场价值近1500亿美元。它的消费者退款服务经常被一些网络游戏玩家用作欺诈工具,对游戏行业造成巨大的负面影响。台湾一家游戏公司发现自己成为了恶意退款欺诈的受害者。仅在2019年1月至4月期间,就发生了近1000万新台币的欺诈性退款,使该公司的收入大幅下降。为了应对退款欺诈,一些游戏公司不得不手动检查并阻止用户的恶意账户,这一过程耗费了大量人力成本。人工检查可能会在一定程度上缓解问题;然而,当新游戏上线时,游戏公司会看到恶意退款激增,导致随后的损失呈指数级增长。为了帮助减少人工核对账户所产生的人工成本、潜在的人为错误和可能由恶意退款造成的潜在损失,本研究提出了一个k-NN模型,通过分析在线玩家的交易记录和游戏玩法数据来检测恶意退款。我们研究的游戏公司的玩家所做的预付次数和金额、退款次数和交易次数被用作我们的k-NN模型的特征。这些特征的使用使我们在F1-Measure中得分最低为0.81。此外,我们使用了三种SMOTE (Synthetic Minority oversampling Technique)采样方法来处理我们研究公司提供的不平衡数据,并改进了我们提出的k-NN模型的F1-Measure(在我们的实验中得分高达0.89)。希望利用我们的k-NN模型可以帮助减少网络游戏公司可能因恶意退款欺诈而造成的潜在损失,威慑恶意玩家的非法收益,防止网络游戏生态系统被恶意退款破坏。
{"title":"Detecting Online Game Malicious Chargeback by using k-NN","authors":"Yu-Chih Wei, You-Xin Lai, Hai-Po Su, Yu-Wen Yen","doi":"10.1109/TrustCom50675.2020.00269","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00269","url":null,"abstract":"It has been estimated that the global gaming market is worth nearly US$150 billion. Its consumer chargeback services often end up being used by some online gamers as a tool to commit fraud, causing a huge adverse impact on the industry. A gaming company in Taiwan found itself falling victim of malicious chargeback fraud. Nearly NT$10 million of fraudulent chargebacks were made during the period from January to April 2019 alone, making a huge dent in the revenue of the company. To counter chargeback fraud, some gaming companies resorted to manually checking for and blocking malicious accounts of their users, incurring huge labor cost in the process. Manual checking might have alleviated the problems to some extent; however, when new games came online, gaming companies would see a surge of malicious chargebacks, causing subsequent exponential increases in losses. To help reduce labor cost incurred by manual account checking, potential human errors and potential losses that may be caused by malicious chargebacks, this study proposed a k-NN model to detect malicious chargebacks by analysing online gamers' transactional records and gameplay data. The numbers of times and the amounts of prepayment, the numbers of times of chargebacks, and the times of the transactions that the gamers of our study gaming company made were used as characteristics for our k-NN model. The use of these characteristics enabled us to score a minimum of 0.81 in F1-Measure. In addition, three SMOTE (Synthetic Minority Over-sampling Technique) sampling methods were used to deal with the imbalance data provided by our study company and improve the F1-Measure of our proposed k-NN model (scoring up to 0.89 in our experiments). It is hoped that the use of our k-NN model can help reduce potential losses of online gaming companies that may be caused by malicious chargeback fraud, deter to malicious gamers against illegal gains, and prevent the online gaming ecosystem from being sabotaged by malicious chargebacks.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122754856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ELPPS: An Enhanced Location Privacy Preserving Scheme in Mobile Crowd-Sensing Network Based on Edge Computing ELPPS:一种基于边缘计算的移动人群传感网络位置隐私保护增强方案
Minghui Li, Yang Li, Liming Fang
Mobile Crowd-Sensing (MCS) is gradually extended to the edge network to reduce the delay of data transmission and improve the ability of data processing. However, a challenge is that there are still loopholes in the protection of privacy data, especially in location-based services. The attacker can reconstruct the location relationship network among the correlation about the environment information, identity information, and other sensing data provided by mobile users. Moreover, in the edge environment, this kind of attack is more accurate and more threatening to the location privacy information. To solve this problem, we propose a location privacy protection scheme (ELPPS) for a mobile crowd-sensing network in the edge environment, to protect the position correlation weight between sensing users through differential privacy. We use the grid anonymous algorithm to confuse the location information in order to reduce the computing cost of edge nodes. The experiment results show that the proposed framework can effectively protect the location information of the sensing users without reducing the availability of the sensing task results, and has a low delay.
移动人群感知(Mobile Crowd-Sensing, MCS)逐渐向边缘网络扩展,以减少数据传输的延迟,提高数据处理能力。然而,一个挑战是,隐私数据的保护仍然存在漏洞,特别是在基于位置的服务中。攻击者可以利用移动用户提供的环境信息、身份信息和其他感知数据之间的相关性重构位置关系网络。而且在边缘环境下,这种攻击更加精准,对位置隐私信息的威胁更大。为了解决这一问题,我们提出了一种边缘环境下移动人群传感网络的位置隐私保护方案(ELPPS),通过差分隐私保护传感用户之间的位置相关权值。为了降低边缘节点的计算成本,我们使用网格匿名算法来混淆位置信息。实验结果表明,该框架在不降低感知任务结果可用性的前提下,能够有效保护感知用户的位置信息,且具有较低的时延。
{"title":"ELPPS: An Enhanced Location Privacy Preserving Scheme in Mobile Crowd-Sensing Network Based on Edge Computing","authors":"Minghui Li, Yang Li, Liming Fang","doi":"10.1109/TrustCom50675.2020.00071","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00071","url":null,"abstract":"Mobile Crowd-Sensing (MCS) is gradually extended to the edge network to reduce the delay of data transmission and improve the ability of data processing. However, a challenge is that there are still loopholes in the protection of privacy data, especially in location-based services. The attacker can reconstruct the location relationship network among the correlation about the environment information, identity information, and other sensing data provided by mobile users. Moreover, in the edge environment, this kind of attack is more accurate and more threatening to the location privacy information. To solve this problem, we propose a location privacy protection scheme (ELPPS) for a mobile crowd-sensing network in the edge environment, to protect the position correlation weight between sensing users through differential privacy. We use the grid anonymous algorithm to confuse the location information in order to reduce the computing cost of edge nodes. The experiment results show that the proposed framework can effectively protect the location information of the sensing users without reducing the availability of the sensing task results, and has a low delay.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116324476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Inference Attacks on Physical Layer Channel State Information 基于物理层信道状态信息的推理攻击
Paul Walther, T. Strufe
In Physical Layer Security, knowing the reciprocal state information of the legitimate terminals' wireless channel is considered a shared secret. Although questioned in recent works, the basic assumption is that an eavesdropper, residing more than half of a wavelength away from the legitimate terminals, is unable to even obtain estimates that are correlated to the state information of the legitimate channel. In this work, we present a Machine Learning based attack that does not require knowledge about the environment or terminal positions, but is solely based on the eavesdropper's measurements. It still successfully infers the legitimate channel state information as represented in impulse responses. We show the effectiveness of our attack by evaluating it on two sets of real world ultra wideband channel impulse responses, for which our attack predictions can achieve higher correlations than even the measurements at the legitimate channel.
在物理层安全中,知道合法终端无线信道的相互状态信息被认为是一个共享的秘密。尽管在最近的工作中受到质疑,但基本假设是,窃听者居住在距离合法终端超过半个波长的地方,甚至无法获得与合法信道状态信息相关的估计。在这项工作中,我们提出了一种基于机器学习的攻击,它不需要关于环境或终端位置的知识,而是完全基于窃听者的测量。它仍然成功地推断出脉冲响应中表示的合法信道状态信息。我们通过对两组真实世界的超宽带信道脉冲响应进行评估来展示攻击的有效性,我们的攻击预测甚至可以达到比合法信道测量更高的相关性。
{"title":"Inference Attacks on Physical Layer Channel State Information","authors":"Paul Walther, T. Strufe","doi":"10.1109/TrustCom50675.2020.00125","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00125","url":null,"abstract":"In Physical Layer Security, knowing the reciprocal state information of the legitimate terminals' wireless channel is considered a shared secret. Although questioned in recent works, the basic assumption is that an eavesdropper, residing more than half of a wavelength away from the legitimate terminals, is unable to even obtain estimates that are correlated to the state information of the legitimate channel. In this work, we present a Machine Learning based attack that does not require knowledge about the environment or terminal positions, but is solely based on the eavesdropper's measurements. It still successfully infers the legitimate channel state information as represented in impulse responses. We show the effectiveness of our attack by evaluating it on two sets of real world ultra wideband channel impulse responses, for which our attack predictions can achieve higher correlations than even the measurements at the legitimate channel.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114870920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A PHP and JSP Web Shell Detection System With Text Processing Based On Machine Learning 基于机器学习的文本处理Web Shell检测系统
Han Zhang, Ming Liu, Zihan Yue, Zhi Xue, Yong-yu Shi, Xiangjian He
Web shell is one of the most common network attack methods, and traditional detection methods may not detect complex and flexible variants of web shell attacks. In this paper, we present a comprehensive detection system that can detect both PHP and JSP web shells. After file classification, we use different feature extraction methods, i.e. AST for PHP files and bytecode for JSP files. We present a detection model based on text processing methods including TF-IDF and Word2vec algorithms. We combine different kinds of machine learning algorithms and perform a comprehensively controlled experiment. After the experiment and evaluation, we choose the detection machine learning model of the best performance, which can achieve a high detection accuracy above 98%.
Web shell是最常见的网络攻击方式之一,传统的检测方法可能无法检测到复杂灵活的Web shell攻击变体。在本文中,我们提出了一个可以同时检测PHP和JSP web shell的综合检测系统。文件分类后,我们使用不同的特征提取方法,即PHP文件使用AST, JSP文件使用字节码。我们提出了一个基于文本处理方法的检测模型,包括TF-IDF和Word2vec算法。我们结合了不同的机器学习算法,并进行了全面的控制实验。经过实验和评估,我们选择了性能最好的检测机器学习模型,该模型可以达到98%以上的高检测准确率。
{"title":"A PHP and JSP Web Shell Detection System With Text Processing Based On Machine Learning","authors":"Han Zhang, Ming Liu, Zihan Yue, Zhi Xue, Yong-yu Shi, Xiangjian He","doi":"10.1109/TrustCom50675.2020.00219","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00219","url":null,"abstract":"Web shell is one of the most common network attack methods, and traditional detection methods may not detect complex and flexible variants of web shell attacks. In this paper, we present a comprehensive detection system that can detect both PHP and JSP web shells. After file classification, we use different feature extraction methods, i.e. AST for PHP files and bytecode for JSP files. We present a detection model based on text processing methods including TF-IDF and Word2vec algorithms. We combine different kinds of machine learning algorithms and perform a comprehensively controlled experiment. After the experiment and evaluation, we choose the detection machine learning model of the best performance, which can achieve a high detection accuracy above 98%.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115320872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
CPN Model Checking Method of Concurrent Software Based on State Space Pruning 基于状态空间剪枝的并发软件CPN模型检验方法
Tao Sun, Jing Yang, Wenjie Zhong
In order to solve the state explosion problem that makes model checking difficult to perform, this paper proposes a state space pruning algorithm. The property transition set is extracted from the ASK-CTL formula and the irrelevant transition set, which represents behaviors independent of the property to be detected is obtained through the data dependence relationship. To simplify the state space, the algorithm reduces concurrent occurrences of irrelevant transitions, which does not change property checking. The experimental results show that the state space pruning algorithm reduces the number of states and arcs of the state space, and improves the verification efficiency.
为了解决状态爆炸给模型检验带来的困难,提出了一种状态空间剪枝算法。从ASK-CTL公式中提取属性转移集,并通过数据依赖关系得到表示与待检测属性无关的行为的无关转移集。为了简化状态空间,该算法减少了不相关转换的并发发生,这不会改变属性检查。实验结果表明,状态空间剪枝算法减少了状态空间的状态数和圆弧数,提高了验证效率。
{"title":"CPN Model Checking Method of Concurrent Software Based on State Space Pruning","authors":"Tao Sun, Jing Yang, Wenjie Zhong","doi":"10.1109/TrustCom50675.2020.00187","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00187","url":null,"abstract":"In order to solve the state explosion problem that makes model checking difficult to perform, this paper proposes a state space pruning algorithm. The property transition set is extracted from the ASK-CTL formula and the irrelevant transition set, which represents behaviors independent of the property to be detected is obtained through the data dependence relationship. To simplify the state space, the algorithm reduces concurrent occurrences of irrelevant transitions, which does not change property checking. The experimental results show that the state space pruning algorithm reduces the number of states and arcs of the state space, and improves the verification efficiency.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114592015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Monitoring Social Media for Vulnerability-Threat Prediction and Topic Analysis 监控社交媒体的漏洞-威胁预测和主题分析
Shin-Ying Huang, Tao Ban
Publicly available software vulnerabilities and exploit code are often abused by malicious actors to launch cyberattacks to vulnerable targets. Organizations not only have to update their software to the latest versions, but do effective patch management and prioritize security-related patching as well. In addition to intelligence sources such as Computer Emergency Response Team (CERT) alerts, cybersecurity news, national vulnerability database (NBD), and commercial cybersecurity vendors, social media is another valuable source that facilitates early stage intelligence gathering. To early detect future cyber threats based on publicly available resources on the Internet, we propose a dynamic vulnerability-threat assessment model to predict the tendency to be exploited for vulnerability entries listed in Common Vulnerability Exposures, and also to analyze social media contents such as Twitter to extract meaningful information. The model takes multiple aspects of vulnerabilities gathered from different sources into consideration. Features range from profile information to contextual information about these vulnerabilities. For the social media data, this study leverages machine learning techniques specially for Twitter which helps to filter out non-cybersecurity-related tweets and also label the topic categories of each tweet. When applied to predict the vulnerabilities exploitation and analyzed the real-world social media discussion data, it showed promising prediction accuracy with purified social media intelligence. Moreover, the AI-enabling modules have been deployed into a threat intelligence platform for further applications.
公开的软件漏洞和漏洞利用代码经常被恶意行为者滥用,对易受攻击的目标发动网络攻击。组织不仅要将他们的软件更新到最新版本,还要进行有效的补丁管理,并优先考虑与安全相关的补丁。除了计算机应急响应小组(CERT)警报、网络安全新闻、国家漏洞数据库(NBD)和商业网络安全供应商等情报来源外,社交媒体是促进早期情报收集的另一个有价值的来源。为了基于互联网上的公开可用资源早期发现未来的网络威胁,我们提出了一个动态漏洞威胁评估模型,以预测常见漏洞暴露中列出的漏洞条目的被利用趋势,并分析社交媒体内容(如Twitter)以提取有意义的信息。该模型考虑了从不同来源收集的漏洞的多个方面。特性的范围从概要信息到有关这些漏洞的上下文信息。对于社交媒体数据,本研究利用了专门针对Twitter的机器学习技术,该技术有助于过滤掉与网络安全无关的推文,并标记每个推文的主题类别。将其应用于预测漏洞利用,并对真实社交媒体讨论数据进行分析,具有纯化的社交媒体智能,预测精度较高。此外,支持ai的模块已部署到威胁情报平台中,以供进一步应用。
{"title":"Monitoring Social Media for Vulnerability-Threat Prediction and Topic Analysis","authors":"Shin-Ying Huang, Tao Ban","doi":"10.1109/TrustCom50675.2020.00243","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00243","url":null,"abstract":"Publicly available software vulnerabilities and exploit code are often abused by malicious actors to launch cyberattacks to vulnerable targets. Organizations not only have to update their software to the latest versions, but do effective patch management and prioritize security-related patching as well. In addition to intelligence sources such as Computer Emergency Response Team (CERT) alerts, cybersecurity news, national vulnerability database (NBD), and commercial cybersecurity vendors, social media is another valuable source that facilitates early stage intelligence gathering. To early detect future cyber threats based on publicly available resources on the Internet, we propose a dynamic vulnerability-threat assessment model to predict the tendency to be exploited for vulnerability entries listed in Common Vulnerability Exposures, and also to analyze social media contents such as Twitter to extract meaningful information. The model takes multiple aspects of vulnerabilities gathered from different sources into consideration. Features range from profile information to contextual information about these vulnerabilities. For the social media data, this study leverages machine learning techniques specially for Twitter which helps to filter out non-cybersecurity-related tweets and also label the topic categories of each tweet. When applied to predict the vulnerabilities exploitation and analyzed the real-world social media discussion data, it showed promising prediction accuracy with purified social media intelligence. Moreover, the AI-enabling modules have been deployed into a threat intelligence platform for further applications.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121232988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Prihook: Differentiated context-aware hook placement for different owners' smartphones Prihook:针对不同用户的智能手机设置不同的上下文感知钩子
Chen Tian, Yazhe Wang, Peng Liu, Yu Wang, Ruirui Dai, Anyuan Zhou, Zhen Xu
A context-aware hook is a piece of code. It checks context-aware user privacy policy before some sensitive operations happen. We propose Prihook to address specific context-aware user privacy concerns through putting specific context-aware hooks. We design User Privacy Preference Table (UPPT) to help a user express his privacy concerns and propose a mapping from the words in the UPPT lexicon to the methods in the Potential Method Set. With this mapping, Prihook is able to (a) select a specific set of methods; and (b) generate and place hooks automatically. Hence, the hook placement in Prihook is personalized. We test Prihook separately on 6 typical UPPTs representing 6 kinds of resource-sensitive UPPTs, and no user privacy violation is found. The experimental results show that the hooks placed by PriHook have small runtime overhead.
上下文感知钩子是一段代码。在某些敏感操作发生之前,它会检查上下文感知的用户隐私策略。我们建议Prihook通过放置特定的上下文感知钩子来解决特定的上下文感知用户隐私问题。我们设计了用户隐私偏好表(UPPT)来帮助用户表达他对隐私的关注,并提出了从UPPT词典中的单词到潜在方法集中的方法的映射。通过这种映射,Prihook能够(a)选择一组特定的方法;(b)自动生成和放置挂钩。因此,Prihook中的钩子位置是个性化的。我们分别在代表6种资源敏感型UPPTs的6个典型UPPTs上对Prihook进行了测试,未发现用户隐私侵犯。实验结果表明,PriHook所放置的钩子具有较小的运行时开销。
{"title":"Prihook: Differentiated context-aware hook placement for different owners' smartphones","authors":"Chen Tian, Yazhe Wang, Peng Liu, Yu Wang, Ruirui Dai, Anyuan Zhou, Zhen Xu","doi":"10.1109/TrustCom50675.2020.00087","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00087","url":null,"abstract":"A context-aware hook is a piece of code. It checks context-aware user privacy policy before some sensitive operations happen. We propose Prihook to address specific context-aware user privacy concerns through putting specific context-aware hooks. We design User Privacy Preference Table (UPPT) to help a user express his privacy concerns and propose a mapping from the words in the UPPT lexicon to the methods in the Potential Method Set. With this mapping, Prihook is able to (a) select a specific set of methods; and (b) generate and place hooks automatically. Hence, the hook placement in Prihook is personalized. We test Prihook separately on 6 typical UPPTs representing 6 kinds of resource-sensitive UPPTs, and no user privacy violation is found. The experimental results show that the hooks placed by PriHook have small runtime overhead.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121554858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1