首页 > 最新文献

2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)最新文献

英文 中文
Modeling and Verification of Spatio-Temporal Intelligent Transportation Systems 时空智能交通系统的建模与验证
Tengfei Li, Xiaohong Chen, Haiying Sun, Jing Liu, Jiajia Yang, Chenchen Yang, Junfeng Sun
Describing spatio-temporal behaviors of cyber-physical systems attracts more and more attention in the filed of intelligent transportation systems and biological systems. The major problem is expressiveness and verifiability for modeling and analysis of spatio-temporal behaviors. In order to verify spatial and spatio-temporal behaviors, in this paper, we propose a methodology to model the evolution of spatial scene snapshots and verify the spatio-temporal models. Firstly, we define a novel Topograph through inducing Bigraph in topological space to characterize cyber-physical systems and verify the model against patterns specified with S4u formulas. Secondly, for spatio-temporal verification, we extend Topograph in dense time, named Temporal Topograph, to describe the evolution of spatial objects, which are verified against spatio-temporal specification language. We evaluate the applicability of the approach on CBTC-based intelligent transportation systems.
描述信息物理系统的时空行为在智能交通系统和生物系统等领域受到越来越多的关注。主要问题是对时空行为建模和分析的可表达性和可验证性。为了验证空间和时空行为,本文提出了一种模拟空间场景快照演变的方法,并验证了时空模型。首先,我们通过在拓扑空间中引入Bigraph来定义一个新的Topograph来表征网络物理系统,并根据S4u公式指定的模式验证该模型。其次,在时空验证方面,我们扩展了密集时间的Topograph,称为Temporal Topograph,用来描述空间对象的演化,并使用时空规范语言对其进行验证。我们评估了该方法在基于cbtc的智能交通系统中的适用性。
{"title":"Modeling and Verification of Spatio-Temporal Intelligent Transportation Systems","authors":"Tengfei Li, Xiaohong Chen, Haiying Sun, Jing Liu, Jiajia Yang, Chenchen Yang, Junfeng Sun","doi":"10.1109/TrustCom50675.2020.00081","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00081","url":null,"abstract":"Describing spatio-temporal behaviors of cyber-physical systems attracts more and more attention in the filed of intelligent transportation systems and biological systems. The major problem is expressiveness and verifiability for modeling and analysis of spatio-temporal behaviors. In order to verify spatial and spatio-temporal behaviors, in this paper, we propose a methodology to model the evolution of spatial scene snapshots and verify the spatio-temporal models. Firstly, we define a novel Topograph through inducing Bigraph in topological space to characterize cyber-physical systems and verify the model against patterns specified with S4u formulas. Secondly, for spatio-temporal verification, we extend Topograph in dense time, named Temporal Topograph, to describe the evolution of spatial objects, which are verified against spatio-temporal specification language. We evaluate the applicability of the approach on CBTC-based intelligent transportation systems.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129491289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
LTMS: A Lightweight Trust Management System for Wireless Medical Sensor Networks LTMS:用于无线医疗传感器网络的轻量级信任管理系统
Muhammad Shadi Hajar, M. Al-Kadri, H. Kalutarage
Wireless Medical Sensor Networks (WMSNs) offer ubiquitous health applications that enhance patients' quality of life and support national health systems. Detecting internal attacks on WMSNs is still challenging since cryptographic measures can not protect from compromised or selfish sensor nodes. Establishing a trust relationship between sensor nodes is recognized as a promising measure to reinforce the overall security of Wireless Sensor Networks (WSNs). However, the existing trust schemes for WSNs are not necessarily fit for WMSNs due to their different operation, topology, resources limitations, and critical applications. In this paper, the aforementioned factors are regarded, and accordingly, two different methods to evaluate the trust value have been proposed to fit in-body, on-body, and off-body sensor nodes. Our Lightweight Trust Management System (LTMS) provides a further line of defense to detect packet drop attacks launched by compromised or selfish sensor nodes. Moreover, simulation results show that LTMS is more robust against complicated on-off attacks and can significantly reduce the processing overhead.
无线医疗传感器网络(wmsn)提供无处不在的健康应用,可提高患者的生活质量并支持国家卫生系统。检测对wmsn的内部攻击仍然具有挑战性,因为加密措施不能保护免受受损或自私的传感器节点。在传感器节点之间建立信任关系被认为是增强无线传感器网络整体安全性的有效措施。但是,由于wmsn的操作方式、拓扑结构、资源限制和关键应用的不同,现有的wsn信任方案并不一定适用于wmsn。本文考虑到上述因素,针对体内、体上和体外传感器节点,提出了两种不同的信任值评估方法。我们的轻量级信任管理系统(LTMS)提供了进一步的防线,以检测由受损或自私的传感器节点发起的丢包攻击。此外,仿真结果表明,LTMS对复杂的开关攻击具有更强的鲁棒性,可以显著降低处理开销。
{"title":"LTMS: A Lightweight Trust Management System for Wireless Medical Sensor Networks","authors":"Muhammad Shadi Hajar, M. Al-Kadri, H. Kalutarage","doi":"10.1109/TrustCom50675.2020.00245","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00245","url":null,"abstract":"Wireless Medical Sensor Networks (WMSNs) offer ubiquitous health applications that enhance patients' quality of life and support national health systems. Detecting internal attacks on WMSNs is still challenging since cryptographic measures can not protect from compromised or selfish sensor nodes. Establishing a trust relationship between sensor nodes is recognized as a promising measure to reinforce the overall security of Wireless Sensor Networks (WSNs). However, the existing trust schemes for WSNs are not necessarily fit for WMSNs due to their different operation, topology, resources limitations, and critical applications. In this paper, the aforementioned factors are regarded, and accordingly, two different methods to evaluate the trust value have been proposed to fit in-body, on-body, and off-body sensor nodes. Our Lightweight Trust Management System (LTMS) provides a further line of defense to detect packet drop attacks launched by compromised or selfish sensor nodes. Moreover, simulation results show that LTMS is more robust against complicated on-off attacks and can significantly reduce the processing overhead.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129841759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Awareness of Secure Coding Guidelines in the Industry - A first data analysis 业界对安全编码指引的认识-首个数据分析
T. Gasiba, U. Lechner, M. Pinto-Albuquerque, Daniel Méndez Fernández
Software needs to be secure, in particular, when deployed to critical infrastructures. Secure coding guidelines capture practices in industrial software engineering to ensure the security of code. This study aims to assess the level of awareness of secure coding in industrial software engineering, the skills of software developers to spot weaknesses in software code, avoid them, and the organizational support to adhere to coding guidelines. The approach draws on well-established theories of policy compliance, neutralization theory, and security-related stress and the authors' many years of experience in industrial software engineering and on lessons identified from training secure coding in the industry. The paper presents the questionnaire design for the online survey and the first analysis of data from the pilot study.
软件需要安全,特别是在部署到关键基础设施时。安全编码指南捕获了工业软件工程中的实践,以确保代码的安全性。本研究旨在评估工业软件工程中安全编码的意识水平,软件开发人员发现软件代码中的弱点并避免它们的技能,以及坚持编码指南的组织支持。该方法借鉴了政策遵从性、中和理论和安全相关压力的成熟理论,以及作者在工业软件工程方面的多年经验,以及在行业中培训安全编码的经验教训。本文介绍了在线调查的问卷设计,并对试点研究的数据进行了初步分析。
{"title":"Awareness of Secure Coding Guidelines in the Industry - A first data analysis","authors":"T. Gasiba, U. Lechner, M. Pinto-Albuquerque, Daniel Méndez Fernández","doi":"10.1109/TrustCom50675.2020.00055","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00055","url":null,"abstract":"Software needs to be secure, in particular, when deployed to critical infrastructures. Secure coding guidelines capture practices in industrial software engineering to ensure the security of code. This study aims to assess the level of awareness of secure coding in industrial software engineering, the skills of software developers to spot weaknesses in software code, avoid them, and the organizational support to adhere to coding guidelines. The approach draws on well-established theories of policy compliance, neutralization theory, and security-related stress and the authors' many years of experience in industrial software engineering and on lessons identified from training secure coding in the industry. The paper presents the questionnaire design for the online survey and the first analysis of data from the pilot study.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130088768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage 基于Cuckoo过滤器的云存储高效可验证联合关键字搜索
C. Fan, Xiaolei Dong, Z. Cao, Jiachen Shen
Searchable Symmetric Encryption(SSE) remains to be one of the hot topics in the field of cloud storage technology. However, malicious servers may return incorrect search results intentionally, which will bring significant security risks to users. Therefore, verifiable searchable encryption emerged. In the meantime, single-keyword query limits the applications of searchable encryption. Accordingly, more expressive searchable encryption schemes are desirable. In this paper, we propose a verifiable conjunctive keyword search scheme based on Cuckoo filter (VCKSCF), which significantly reduces verification and storage overhead. Security analysis indicates that the proposed scheme achieves security in the face of indistinguishability under chosen keyword attack and the unforgeability of proofs and search tokens. Meanwhile, the experimental evaluation demonstrates that it achieves preferable performance in real-world settings.
可搜索对称加密(SSE)一直是云存储技术领域的研究热点之一。然而,恶意服务器可能会故意返回错误的搜索结果,这将给用户带来重大的安全风险。因此,可验证的可搜索加密出现了。同时,单关键字查询限制了可搜索加密的应用。因此,需要更具表现力的可搜索加密方案。本文提出了一种基于杜鹃滤波器的可验证联合关键字搜索方案(VCKSCF),该方案显著降低了验证和存储开销。安全性分析表明,该方案在面对选择关键字攻击下的不可区分性、证明和搜索令牌的不可伪造性的情况下实现了安全性。同时,实验评估表明,该方法在实际环境中取得了较好的性能。
{"title":"VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage","authors":"C. Fan, Xiaolei Dong, Z. Cao, Jiachen Shen","doi":"10.1109/TrustCom50675.2020.00048","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00048","url":null,"abstract":"Searchable Symmetric Encryption(SSE) remains to be one of the hot topics in the field of cloud storage technology. However, malicious servers may return incorrect search results intentionally, which will bring significant security risks to users. Therefore, verifiable searchable encryption emerged. In the meantime, single-keyword query limits the applications of searchable encryption. Accordingly, more expressive searchable encryption schemes are desirable. In this paper, we propose a verifiable conjunctive keyword search scheme based on Cuckoo filter (VCKSCF), which significantly reduces verification and storage overhead. Security analysis indicates that the proposed scheme achieves security in the face of indistinguishability under chosen keyword attack and the unforgeability of proofs and search tokens. Meanwhile, the experimental evaluation demonstrates that it achieves preferable performance in real-world settings.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128861871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Approach for Poisoning Attacks against RNN-Based Cyber Anomaly Detection 一种针对rnn网络异常检测的投毒攻击方法
Jinghui Xu, Yu Wen, Chun Yang, Dan Meng
In the face of the increasingly complex Internet environment, the traditional intrusion detection system is difficult to cope with the unknown variety of attacks. People hope to find reliable anomaly detection technology to help improve the security of cyberspace. The rapid development of artificial intelligence technology provides new development opportunities for anomaly detection technology, and the anomaly detection system based on deep learning performs well in some studies. However, neural networks are highly dependent on data quality, and a small number of poisoned samples injected into the data set will have a huge impact on the results. The online abnormal threat detection system based on deep learning is likely to be attacked by poisoning due to the need for continuous data collection and training. We propose a poisoning attack method using adversarial samples to resist the anomaly detection system based on an unsupervised deep neural network, which can destroy the neural network with as few samples as possible. We verified the effectiveness of poisoning attacks on the network security data set of los alamos national laboratory and further demonstrated its generality on other abnormal detection data set.
面对日益复杂的互联网环境,传统的入侵检测系统难以应对各种未知的攻击。人们希望找到可靠的异常检测技术来帮助提高网络空间的安全性。人工智能技术的快速发展为异常检测技术提供了新的发展机遇,基于深度学习的异常检测系统在一些研究中表现良好。然而,神经网络高度依赖于数据质量,少量的有毒样本注入到数据集中会对结果产生巨大的影响。基于深度学习的在线异常威胁检测系统由于需要持续的数据采集和训练,极易受到中毒攻击。我们提出了一种利用对抗性样本来抵抗基于无监督深度神经网络的异常检测系统的投毒攻击方法,该方法可以用尽可能少的样本破坏神经网络。我们在los alamos国家实验室的网络安全数据集上验证了投毒攻击的有效性,并进一步证明了其在其他异常检测数据集上的通用性。
{"title":"An Approach for Poisoning Attacks against RNN-Based Cyber Anomaly Detection","authors":"Jinghui Xu, Yu Wen, Chun Yang, Dan Meng","doi":"10.1109/TrustCom50675.2020.00231","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00231","url":null,"abstract":"In the face of the increasingly complex Internet environment, the traditional intrusion detection system is difficult to cope with the unknown variety of attacks. People hope to find reliable anomaly detection technology to help improve the security of cyberspace. The rapid development of artificial intelligence technology provides new development opportunities for anomaly detection technology, and the anomaly detection system based on deep learning performs well in some studies. However, neural networks are highly dependent on data quality, and a small number of poisoned samples injected into the data set will have a huge impact on the results. The online abnormal threat detection system based on deep learning is likely to be attacked by poisoning due to the need for continuous data collection and training. We propose a poisoning attack method using adversarial samples to resist the anomaly detection system based on an unsupervised deep neural network, which can destroy the neural network with as few samples as possible. We verified the effectiveness of poisoning attacks on the network security data set of los alamos national laboratory and further demonstrated its generality on other abnormal detection data set.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121622606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Password Policies vs. Usability: When Do Users Go “Bananas”? 密码策略vs可用性:用户什么时候会“抓狂”?
Roberto Dillon, S. Chawla, Dayana Hristova, Barbara Göbl, Suzana Jovicic
To grant password security, it is still a common practice to request users to comply with a number of rules that need to be met for the resulting password to be valid. Users have no option but to comply with the rules, but is there a specific point where the required rules start being perceived as a nuisance and thus jeopardize security? This paper addresses users' reactions to such a scenario by means of an online survey ($mathrm{N}=51$) where users are being asked to create a password following an increasing number of restrictions. We thereby follow their evolving responses as each further criterion is added. Our analysis confirms that the increase in rule complexity has detrimental effects on usability and can lead to workarounds potentially compromising password security.
为了授予密码安全性,通常的做法仍然是要求用户遵守一些规则,这些规则需要满足才能使生成的密码有效。用户除了遵守规则之外别无选择,但是是否存在这样一个特定点,即所需的规则开始被视为一种麻烦,从而危及安全性?本文通过在线调查($ mathm {N}=51$)解决了用户对这种情况的反应,其中要求用户根据越来越多的限制创建密码。因此,随着每一项进一步的标准的增加,我们将关注他们不断变化的反应。我们的分析证实,规则复杂性的增加对可用性有不利影响,并可能导致可能危及密码安全性的变通方法。
{"title":"Password Policies vs. Usability: When Do Users Go “Bananas”?","authors":"Roberto Dillon, S. Chawla, Dayana Hristova, Barbara Göbl, Suzana Jovicic","doi":"10.1109/TrustCom50675.2020.00032","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00032","url":null,"abstract":"To grant password security, it is still a common practice to request users to comply with a number of rules that need to be met for the resulting password to be valid. Users have no option but to comply with the rules, but is there a specific point where the required rules start being perceived as a nuisance and thus jeopardize security? This paper addresses users' reactions to such a scenario by means of an online survey ($mathrm{N}=51$) where users are being asked to create a password following an increasing number of restrictions. We thereby follow their evolving responses as each further criterion is added. Our analysis confirms that the increase in rule complexity has detrimental effects on usability and can lead to workarounds potentially compromising password security.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122520038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the Comparison of Classifiers' Construction over Private Inputs 私人投入分类器结构比较研究
M. Alishahi, Nicola Zannone
Classifiers are often trained over data collected from different sources. Sharing their data with other entities, however, can raise privacy concerns for data owners. To protect data confidentiality while being able to train a classifier, effective solutions have been proposed in the literature to construct various types of classifiers over private data. However, to date an analysis and comparison of the computation and communication costs for the construction of classifiers over private data is missing, making it difficult to determine which classifier can be used in a given application domain. In this work, we show how two well-known classifiers (Naive Bayes and SVM classifiers) can be securely build over private inputs, and evaluate their construction costs. We assess the computation and communication costs for training the classifiers both theoretically and empirically for different benchmark datasets.
分类器通常使用从不同来源收集的数据进行训练。然而,与其他实体共享他们的数据可能会引起数据所有者的隐私担忧。为了在能够训练分类器的同时保护数据机密性,文献中已经提出了有效的解决方案来在私有数据上构建各种类型的分类器。然而,到目前为止,在私有数据上构建分类器的计算和通信成本的分析和比较是缺失的,这使得很难确定在给定的应用领域中可以使用哪个分类器。在这项工作中,我们展示了两个众所周知的分类器(朴素贝叶斯和支持向量机分类器)如何在私人输入上安全地构建,并评估它们的构建成本。针对不同的基准数据集,我们从理论上和经验上评估了训练分类器的计算和通信成本。
{"title":"On the Comparison of Classifiers' Construction over Private Inputs","authors":"M. Alishahi, Nicola Zannone","doi":"10.1109/TrustCom50675.2020.00096","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00096","url":null,"abstract":"Classifiers are often trained over data collected from different sources. Sharing their data with other entities, however, can raise privacy concerns for data owners. To protect data confidentiality while being able to train a classifier, effective solutions have been proposed in the literature to construct various types of classifiers over private data. However, to date an analysis and comparison of the computation and communication costs for the construction of classifiers over private data is missing, making it difficult to determine which classifier can be used in a given application domain. In this work, we show how two well-known classifiers (Naive Bayes and SVM classifiers) can be securely build over private inputs, and evaluate their construction costs. We assess the computation and communication costs for training the classifiers both theoretically and empirically for different benchmark datasets.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120874372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Monitoring Social Media for Vulnerability-Threat Prediction and Topic Analysis 监控社交媒体的漏洞-威胁预测和主题分析
Shin-Ying Huang, Tao Ban
Publicly available software vulnerabilities and exploit code are often abused by malicious actors to launch cyberattacks to vulnerable targets. Organizations not only have to update their software to the latest versions, but do effective patch management and prioritize security-related patching as well. In addition to intelligence sources such as Computer Emergency Response Team (CERT) alerts, cybersecurity news, national vulnerability database (NBD), and commercial cybersecurity vendors, social media is another valuable source that facilitates early stage intelligence gathering. To early detect future cyber threats based on publicly available resources on the Internet, we propose a dynamic vulnerability-threat assessment model to predict the tendency to be exploited for vulnerability entries listed in Common Vulnerability Exposures, and also to analyze social media contents such as Twitter to extract meaningful information. The model takes multiple aspects of vulnerabilities gathered from different sources into consideration. Features range from profile information to contextual information about these vulnerabilities. For the social media data, this study leverages machine learning techniques specially for Twitter which helps to filter out non-cybersecurity-related tweets and also label the topic categories of each tweet. When applied to predict the vulnerabilities exploitation and analyzed the real-world social media discussion data, it showed promising prediction accuracy with purified social media intelligence. Moreover, the AI-enabling modules have been deployed into a threat intelligence platform for further applications.
公开的软件漏洞和漏洞利用代码经常被恶意行为者滥用,对易受攻击的目标发动网络攻击。组织不仅要将他们的软件更新到最新版本,还要进行有效的补丁管理,并优先考虑与安全相关的补丁。除了计算机应急响应小组(CERT)警报、网络安全新闻、国家漏洞数据库(NBD)和商业网络安全供应商等情报来源外,社交媒体是促进早期情报收集的另一个有价值的来源。为了基于互联网上的公开可用资源早期发现未来的网络威胁,我们提出了一个动态漏洞威胁评估模型,以预测常见漏洞暴露中列出的漏洞条目的被利用趋势,并分析社交媒体内容(如Twitter)以提取有意义的信息。该模型考虑了从不同来源收集的漏洞的多个方面。特性的范围从概要信息到有关这些漏洞的上下文信息。对于社交媒体数据,本研究利用了专门针对Twitter的机器学习技术,该技术有助于过滤掉与网络安全无关的推文,并标记每个推文的主题类别。将其应用于预测漏洞利用,并对真实社交媒体讨论数据进行分析,具有纯化的社交媒体智能,预测精度较高。此外,支持ai的模块已部署到威胁情报平台中,以供进一步应用。
{"title":"Monitoring Social Media for Vulnerability-Threat Prediction and Topic Analysis","authors":"Shin-Ying Huang, Tao Ban","doi":"10.1109/TrustCom50675.2020.00243","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00243","url":null,"abstract":"Publicly available software vulnerabilities and exploit code are often abused by malicious actors to launch cyberattacks to vulnerable targets. Organizations not only have to update their software to the latest versions, but do effective patch management and prioritize security-related patching as well. In addition to intelligence sources such as Computer Emergency Response Team (CERT) alerts, cybersecurity news, national vulnerability database (NBD), and commercial cybersecurity vendors, social media is another valuable source that facilitates early stage intelligence gathering. To early detect future cyber threats based on publicly available resources on the Internet, we propose a dynamic vulnerability-threat assessment model to predict the tendency to be exploited for vulnerability entries listed in Common Vulnerability Exposures, and also to analyze social media contents such as Twitter to extract meaningful information. The model takes multiple aspects of vulnerabilities gathered from different sources into consideration. Features range from profile information to contextual information about these vulnerabilities. For the social media data, this study leverages machine learning techniques specially for Twitter which helps to filter out non-cybersecurity-related tweets and also label the topic categories of each tweet. When applied to predict the vulnerabilities exploitation and analyzed the real-world social media discussion data, it showed promising prediction accuracy with purified social media intelligence. Moreover, the AI-enabling modules have been deployed into a threat intelligence platform for further applications.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121232988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ELPPS: An Enhanced Location Privacy Preserving Scheme in Mobile Crowd-Sensing Network Based on Edge Computing ELPPS:一种基于边缘计算的移动人群传感网络位置隐私保护增强方案
Minghui Li, Yang Li, Liming Fang
Mobile Crowd-Sensing (MCS) is gradually extended to the edge network to reduce the delay of data transmission and improve the ability of data processing. However, a challenge is that there are still loopholes in the protection of privacy data, especially in location-based services. The attacker can reconstruct the location relationship network among the correlation about the environment information, identity information, and other sensing data provided by mobile users. Moreover, in the edge environment, this kind of attack is more accurate and more threatening to the location privacy information. To solve this problem, we propose a location privacy protection scheme (ELPPS) for a mobile crowd-sensing network in the edge environment, to protect the position correlation weight between sensing users through differential privacy. We use the grid anonymous algorithm to confuse the location information in order to reduce the computing cost of edge nodes. The experiment results show that the proposed framework can effectively protect the location information of the sensing users without reducing the availability of the sensing task results, and has a low delay.
移动人群感知(Mobile Crowd-Sensing, MCS)逐渐向边缘网络扩展,以减少数据传输的延迟,提高数据处理能力。然而,一个挑战是,隐私数据的保护仍然存在漏洞,特别是在基于位置的服务中。攻击者可以利用移动用户提供的环境信息、身份信息和其他感知数据之间的相关性重构位置关系网络。而且在边缘环境下,这种攻击更加精准,对位置隐私信息的威胁更大。为了解决这一问题,我们提出了一种边缘环境下移动人群传感网络的位置隐私保护方案(ELPPS),通过差分隐私保护传感用户之间的位置相关权值。为了降低边缘节点的计算成本,我们使用网格匿名算法来混淆位置信息。实验结果表明,该框架在不降低感知任务结果可用性的前提下,能够有效保护感知用户的位置信息,且具有较低的时延。
{"title":"ELPPS: An Enhanced Location Privacy Preserving Scheme in Mobile Crowd-Sensing Network Based on Edge Computing","authors":"Minghui Li, Yang Li, Liming Fang","doi":"10.1109/TrustCom50675.2020.00071","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00071","url":null,"abstract":"Mobile Crowd-Sensing (MCS) is gradually extended to the edge network to reduce the delay of data transmission and improve the ability of data processing. However, a challenge is that there are still loopholes in the protection of privacy data, especially in location-based services. The attacker can reconstruct the location relationship network among the correlation about the environment information, identity information, and other sensing data provided by mobile users. Moreover, in the edge environment, this kind of attack is more accurate and more threatening to the location privacy information. To solve this problem, we propose a location privacy protection scheme (ELPPS) for a mobile crowd-sensing network in the edge environment, to protect the position correlation weight between sensing users through differential privacy. We use the grid anonymous algorithm to confuse the location information in order to reduce the computing cost of edge nodes. The experiment results show that the proposed framework can effectively protect the location information of the sensing users without reducing the availability of the sensing task results, and has a low delay.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116324476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IoT-Sphere: A Framework To Secure IoT Devices From Becoming Attack Target And Attack Source 物联网领域:防止物联网设备成为攻击目标和攻击源的框架
Syed Ghazanfar Abbas, M. Husnain, U. U. Fayyaz, F. Shahzad, G. Shah, K. Zafar
In this research we propose a framework that will strengthen the IoT devices security from dual perspectives; avoid devices to become attack target as well as a source of an attack. Unlike traditional devices, IoT devices are equipped with insufficient host-based defense system and a continuous internet connection. All time internet enabled devices with insufficient security allures the attackers to use such devices and carry out their attacks on rest of internet. When plethora of vulnerable devices become source of an attack, intensity of such attacks increases exponentially. Mirai was one of the first well-known attack that exploited large number of vulnerable IoT devices, that bring down a large part of Internet. To strengthen the IoT devices from dual security perspective, we propose a two step framework. Firstly, confine the communication boundary of IoT devices; IoT-Sphere. A sphere of IPs that are allowed to communicate with a device. Any communication that violates the sphere will be blocked at the gateway level. Secondly, only allowed communication will be evaluated for potential attacks and anomalies using advance detection engines. To show the effectiveness of our proposed framework, we perform couple of attacks on IoT devices; camera and google home and show the feasibility of IoT-Sphere.
在本研究中,我们提出了一个框架,将从两个角度加强物联网设备的安全性;避免设备成为攻击目标和攻击源。与传统设备不同,物联网设备配备的基于主机的防御系统和持续的互联网连接不足。安全性不足的所有支持互联网的设备都会诱使攻击者使用这些设备并对互联网的其余部分进行攻击。当大量易受攻击的设备成为攻击源时,这种攻击的强度会呈指数级增长。Mirai是第一个众所周知的攻击之一,它利用了大量易受攻击的物联网设备,导致大部分互联网瘫痪。为了从双重安全的角度加强物联网设备,我们提出了一个两步框架。首先,限制物联网设备的通信边界;IoT-Sphere。允许与设备通信的ip范围。任何违反球体的通信都将在网关级别被阻止。其次,只有允许的通信才会使用先进的检测引擎来评估潜在的攻击和异常。为了证明我们提出的框架的有效性,我们对物联网设备进行了几次攻击;并展示物联网领域的可行性。
{"title":"IoT-Sphere: A Framework To Secure IoT Devices From Becoming Attack Target And Attack Source","authors":"Syed Ghazanfar Abbas, M. Husnain, U. U. Fayyaz, F. Shahzad, G. Shah, K. Zafar","doi":"10.1109/TrustCom50675.2020.00189","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00189","url":null,"abstract":"In this research we propose a framework that will strengthen the IoT devices security from dual perspectives; avoid devices to become attack target as well as a source of an attack. Unlike traditional devices, IoT devices are equipped with insufficient host-based defense system and a continuous internet connection. All time internet enabled devices with insufficient security allures the attackers to use such devices and carry out their attacks on rest of internet. When plethora of vulnerable devices become source of an attack, intensity of such attacks increases exponentially. Mirai was one of the first well-known attack that exploited large number of vulnerable IoT devices, that bring down a large part of Internet. To strengthen the IoT devices from dual security perspective, we propose a two step framework. Firstly, confine the communication boundary of IoT devices; IoT-Sphere. A sphere of IPs that are allowed to communicate with a device. Any communication that violates the sphere will be blocked at the gateway level. Secondly, only allowed communication will be evaluated for potential attacks and anomalies using advance detection engines. To show the effectiveness of our proposed framework, we perform couple of attacks on IoT devices; camera and google home and show the feasibility of IoT-Sphere.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127802465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1