首页 > 最新文献

2017 Military Communications and Information Systems Conference (MilCIS)最新文献

英文 中文
Architecture of XMPP proxy for server-to-server connections 服务器到服务器连接的XMPP代理体系结构
Pub Date : 2017-12-14 DOI: 10.1109/MILCIS.2017.8190423
J. Järvinen, Aleksi Marttinen, M. Luoma, M. Peuhkuri, J. Manner
The Extensible Messaging and Presence Protocol (XMPP) is one of the most popular Instant Messaging (IM) protocols which uses a client-server working mode. This protocol uses different connection primitives for both client-to-server (c2s) and server-to-server (s2s) connections. It is actively used in mission-critical operations where the reliability and security of communication systems is always imperative. One approach to secure services and private networks is to use proxy services as security gateways. Proxies enable interoperability between different security domains acting as Information Exchange Gateways (IEGs). In this paper we present an architecture of the XMPP proxy for s2s connections. The system is based on an Openfire XMPP server with a Hazelcast clustering plugin, and a Hazelcast clustering link is used between the XMPP server and the XMPP Proxy. We have constructed an implementation to verify and validate the presented approach. Our proposal enables an effective seamless connection for XMPP proxies. Furthermore, it increases the system security for example, terminating both TCP and XMPP flows to prevent malicious attacks. Finally, we show that the proposal does not significantly increase the anticipated delay of the communication.
可扩展消息传递和状态协议(XMPP)是最流行的即时消息传递协议之一,它使用客户机-服务器工作模式。该协议对客户机到服务器(c2s)和服务器到服务器(s2s)连接使用不同的连接原语。它被积极应用于关键任务操作中,在这些操作中,通信系统的可靠性和安全性总是必不可少的。保护服务和专用网络的一种方法是使用代理服务作为安全网关。代理支持充当信息交换网关(Information Exchange gateway, ieg)的不同安全域之间的互操作性。本文提出了一种用于s2s连接的XMPP代理的体系结构。该系统基于带有Hazelcast集群插件的Openfire XMPP服务器,并且在XMPP服务器和XMPP代理之间使用Hazelcast集群链接。我们已经构造了一个实现来验证所提出的方法。我们的建议为XMPP代理提供了有效的无缝连接。此外,它还提高了系统的安全性,例如,终止TCP和XMPP流,以防止恶意攻击。最后,我们证明了该提议不会显著增加通信的预期延迟。
{"title":"Architecture of XMPP proxy for server-to-server connections","authors":"J. Järvinen, Aleksi Marttinen, M. Luoma, M. Peuhkuri, J. Manner","doi":"10.1109/MILCIS.2017.8190423","DOIUrl":"https://doi.org/10.1109/MILCIS.2017.8190423","url":null,"abstract":"The Extensible Messaging and Presence Protocol (XMPP) is one of the most popular Instant Messaging (IM) protocols which uses a client-server working mode. This protocol uses different connection primitives for both client-to-server (c2s) and server-to-server (s2s) connections. It is actively used in mission-critical operations where the reliability and security of communication systems is always imperative. One approach to secure services and private networks is to use proxy services as security gateways. Proxies enable interoperability between different security domains acting as Information Exchange Gateways (IEGs). In this paper we present an architecture of the XMPP proxy for s2s connections. The system is based on an Openfire XMPP server with a Hazelcast clustering plugin, and a Hazelcast clustering link is used between the XMPP server and the XMPP Proxy. We have constructed an implementation to verify and validate the presented approach. Our proposal enables an effective seamless connection for XMPP proxies. Furthermore, it increases the system security for example, terminating both TCP and XMPP flows to prevent malicious attacks. Finally, we show that the proposal does not significantly increase the anticipated delay of the communication.","PeriodicalId":227691,"journal":{"name":"2017 Military Communications and Information Systems Conference (MilCIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129943983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A framework for the evaluation of the theoretical threat coverage provided by intrusion detection systems 一个评估入侵检测系统理论威胁覆盖率的框架
Pub Date : 2017-11-01 DOI: 10.1109/MILCIS.2017.8188557
Gideon Creech
Intrusion detection systems are a central component of cyber security architecture, and their accuracy is a critical performance metric for any security deployment. Most of the current performance analysis of intrusion detection systems relies on empirical profiling of a given algorithm or implementation against a benchmark dataset. Whilst effective to a point, this traditional evaluation methodology is unable to assess the completeness of threat coverage provided by an intrusion detection system and is consequently a sub-optimal approach if conducted in isolation of other tests. This paper introduces a framework to evaluate the total potential coverage provided by an intrusion detection system as a function of its data sources, extending and complementing the traditional approach.
入侵检测系统是网络安全体系结构的核心组成部分,其准确性是任何安全部署的关键性能指标。目前大多数入侵检测系统的性能分析依赖于针对基准数据集对给定算法或实现的经验分析。虽然在某种程度上是有效的,但这种传统的评估方法无法评估入侵检测系统提供的威胁覆盖的完整性,因此如果与其他测试隔离进行,则是次优方法。本文介绍了一种评估入侵检测系统所提供的总潜在覆盖范围作为其数据源函数的框架,对传统方法进行了扩展和补充。
{"title":"A framework for the evaluation of the theoretical threat coverage provided by intrusion detection systems","authors":"Gideon Creech","doi":"10.1109/MILCIS.2017.8188557","DOIUrl":"https://doi.org/10.1109/MILCIS.2017.8188557","url":null,"abstract":"Intrusion detection systems are a central component of cyber security architecture, and their accuracy is a critical performance metric for any security deployment. Most of the current performance analysis of intrusion detection systems relies on empirical profiling of a given algorithm or implementation against a benchmark dataset. Whilst effective to a point, this traditional evaluation methodology is unable to assess the completeness of threat coverage provided by an intrusion detection system and is consequently a sub-optimal approach if conducted in isolation of other tests. This paper introduces a framework to evaluate the total potential coverage provided by an intrusion detection system as a function of its data sources, extending and complementing the traditional approach.","PeriodicalId":227691,"journal":{"name":"2017 Military Communications and Information Systems Conference (MilCIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130326042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and modeling of energy efficient WSN architecture for tactical applications 战术应用的节能无线传感器网络体系结构设计与建模
Pub Date : 2017-11-01 DOI: 10.1109/MILCIS.2017.8190425
Nazeeruddin Mohammad, Shahabuddin Muhammad, A. Bashar, M. Khan
Wireless Sensor Networks (WSNs) have a wide variety military applications including battlefield surveillance, enemy tracking, and target classification. In this paper, we propose a WSN architecture based on a mobile sink. The proposed architecture differentiates the regular data from the critical data, and leverages this difference to reduce the energy consumption in WSNs. We formally modeled the mobile and static sink based architectures and analyzed the energy consumption and data delays using a probabilistic model checker.
无线传感器网络(wsn)具有广泛的军事应用,包括战场监视、敌人跟踪和目标分类。在本文中,我们提出了一种基于移动接收器的WSN架构。该架构将常规数据与关键数据区分开来,并利用这一差异来降低无线传感器网络的能耗。我们正式建模了基于移动和静态接收器的架构,并使用概率模型检查器分析了能耗和数据延迟。
{"title":"Design and modeling of energy efficient WSN architecture for tactical applications","authors":"Nazeeruddin Mohammad, Shahabuddin Muhammad, A. Bashar, M. Khan","doi":"10.1109/MILCIS.2017.8190425","DOIUrl":"https://doi.org/10.1109/MILCIS.2017.8190425","url":null,"abstract":"Wireless Sensor Networks (WSNs) have a wide variety military applications including battlefield surveillance, enemy tracking, and target classification. In this paper, we propose a WSN architecture based on a mobile sink. The proposed architecture differentiates the regular data from the critical data, and leverages this difference to reduce the energy consumption in WSNs. We formally modeled the mobile and static sink based architectures and analyzed the energy consumption and data delays using a probabilistic model checker.","PeriodicalId":227691,"journal":{"name":"2017 Military Communications and Information Systems Conference (MilCIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133454094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Collaborative anomaly detection framework for handling big data of cloud computing 处理云计算大数据的协同异常检测框架
Pub Date : 2017-11-01 DOI: 10.1109/MILCIS.2017.8190421
Nour Moustafa, Gideon Creech, E. Sitnikova, Marwa Keshk
With the ubiquitous computing of providing services and applications at anywhere and anytime, cloud computing is the best option as it offers flexible and pay-per-use based services to its customers. Nevertheless, security and privacy are the main challenges to its success due to its dynamic and distributed architecture, resulting in generating big data that should be carefully analysed for detecting network's vulnerabilities. In this paper, we propose a Collaborative Anomaly Detection Framework (CADF) for detecting cyber attacks from cloud computing environments. We provide the technical functions and deployment of the framework to illustrate its methodology of implementation and installation. The framework is evaluated on the UNSW-NB15 dataset to check its credibility while deploying it in cloud computing environments. The experimental results showed that this framework can easily handle large-scale systems as its implementation requires only estimating statistical measures from network observations. Moreover, the evaluation performance of the framework outperforms three state-of-the-art techniques in terms of false positive rate and detection rate.
随着无处不在的计算在任何地点和任何时间提供服务和应用程序,云计算是最佳选择,因为它为客户提供灵活且按使用付费的服务。然而,由于其动态和分布式架构,安全和隐私是其成功的主要挑战,从而产生了应该仔细分析以检测网络漏洞的大数据。在本文中,我们提出了一个协同异常检测框架(CADF)来检测来自云计算环境的网络攻击。我们提供了框架的技术功能和部署,以说明其实现和安装的方法。该框架在UNSW-NB15数据集上进行评估,以检查其在云计算环境中部署时的可信度。实验结果表明,该框架的实现只需要从网络观测中估计统计度量,可以很容易地处理大规模系统。此外,在误报率和检测率方面,该框架的评估性能优于三种最先进的技术。
{"title":"Collaborative anomaly detection framework for handling big data of cloud computing","authors":"Nour Moustafa, Gideon Creech, E. Sitnikova, Marwa Keshk","doi":"10.1109/MILCIS.2017.8190421","DOIUrl":"https://doi.org/10.1109/MILCIS.2017.8190421","url":null,"abstract":"With the ubiquitous computing of providing services and applications at anywhere and anytime, cloud computing is the best option as it offers flexible and pay-per-use based services to its customers. Nevertheless, security and privacy are the main challenges to its success due to its dynamic and distributed architecture, resulting in generating big data that should be carefully analysed for detecting network's vulnerabilities. In this paper, we propose a Collaborative Anomaly Detection Framework (CADF) for detecting cyber attacks from cloud computing environments. We provide the technical functions and deployment of the framework to illustrate its methodology of implementation and installation. The framework is evaluated on the UNSW-NB15 dataset to check its credibility while deploying it in cloud computing environments. The experimental results showed that this framework can easily handle large-scale systems as its implementation requires only estimating statistical measures from network observations. Moreover, the evaluation performance of the framework outperforms three state-of-the-art techniques in terms of false positive rate and detection rate.","PeriodicalId":227691,"journal":{"name":"2017 Military Communications and Information Systems Conference (MilCIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129977825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Privacy preservation intrusion detection technique for SCADA systems SCADA系统的隐私保护入侵检测技术
Pub Date : 2017-11-01 DOI: 10.1109/MILCIS.2017.8190422
Marwa Keshk, Nour Moustafa, E. Sitnikova, Gideon Creech
Supervisory Control and Data Acquisition (SCADA) systems face the absence of a protection technique that can beat different types of intrusions and protect the data from disclosure while handling this data using other applications, specifically Intrusion Detection System (IDS). The SCADA system can manage the critical infrastructure of industrial control environments. Protecting sensitive information is a difficult task to achieve in reality with the connection of physical and digital systems. Hence, privacy preservation techniques have become effective in order to protect sensitive/private information and to detect malicious activities, but they are not accurate in terms of error detection, sensitivity percentage of data disclosure. In this paper, we propose a new Privacy Preservation Intrusion Detection (PPID) technique based on the correlation coefficient and Expectation Maximisation (EM) clustering mechanisms for selecting important portions of data and recognizing intrusive events. This technique is evaluated on the power system datasets for multiclass attacks to measure its reliability for detecting suspicious activities. The experimental results outperform three techniques in the above terms, showing the efficiency and effectiveness of the proposed technique to be utilized for current SCADA systems.
监控和数据采集(SCADA)系统在使用其他应用程序(特别是入侵检测系统(IDS))处理这些数据时,缺乏能够击败不同类型入侵并保护数据免遭泄露的保护技术。SCADA系统可以管理工业控制环境中的关键基础设施。在物理系统与数字系统相结合的现实中,保护敏感信息是一项难以实现的任务。因此,隐私保护技术在保护敏感/私人信息和检测恶意活动方面变得有效,但在错误检测,数据泄露的敏感性百分比方面并不准确。本文提出了一种新的基于相关系数和期望最大化聚类机制的隐私保护入侵检测(PPID)技术,用于选择数据的重要部分和识别入侵事件。在针对多类攻击的电力系统数据集上对该技术进行了评估,以衡量其检测可疑活动的可靠性。实验结果优于上述三种技术,表明所提出的技术可用于当前SCADA系统的效率和有效性。
{"title":"Privacy preservation intrusion detection technique for SCADA systems","authors":"Marwa Keshk, Nour Moustafa, E. Sitnikova, Gideon Creech","doi":"10.1109/MILCIS.2017.8190422","DOIUrl":"https://doi.org/10.1109/MILCIS.2017.8190422","url":null,"abstract":"Supervisory Control and Data Acquisition (SCADA) systems face the absence of a protection technique that can beat different types of intrusions and protect the data from disclosure while handling this data using other applications, specifically Intrusion Detection System (IDS). The SCADA system can manage the critical infrastructure of industrial control environments. Protecting sensitive information is a difficult task to achieve in reality with the connection of physical and digital systems. Hence, privacy preservation techniques have become effective in order to protect sensitive/private information and to detect malicious activities, but they are not accurate in terms of error detection, sensitivity percentage of data disclosure. In this paper, we propose a new Privacy Preservation Intrusion Detection (PPID) technique based on the correlation coefficient and Expectation Maximisation (EM) clustering mechanisms for selecting important portions of data and recognizing intrusive events. This technique is evaluated on the power system datasets for multiclass attacks to measure its reliability for detecting suspicious activities. The experimental results outperform three techniques in the above terms, showing the efficiency and effectiveness of the proposed technique to be utilized for current SCADA systems.","PeriodicalId":227691,"journal":{"name":"2017 Military Communications and Information Systems Conference (MilCIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131447165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Changing users' security behaviour towards security questions: A game based learning approach 改变用户对安全问题的安全行为:基于游戏的学习方法
Pub Date : 2017-09-24 DOI: 10.1109/MILCIS.2017.8190424
Nicholas Micallef, N. Arachchilage
Fallback authentication is used to retrieve forgotten passwords. Security questions are one of the main techniques used to conduct fallback authentication. In this paper, we propose a serious game design that uses system-generated security questions with the aim of improving the usability of fallback authentication. For this purpose, we adopted the popular picture-based ‘4 Pics 1 word’ mobile game. This game was selected because of its use of pictures and cues, which previous psychology research found to be crucial to aid memorability. This game asks users to pick the word that relates to the given pictures. We then customized this game by adding features which help maximize the following memory retrieval skills: (a) verbal cues — by providing hints with verbal descriptions; (b) spatial cues — by maintaining the same order of pictures; (c) graphical cues — by showing 4 images for each challenge; (d) interactivity/engaging nature of the game.
回退身份验证用于检索忘记的密码。安全问题是用于执行后备身份验证的主要技术之一。在本文中,我们提出了一个严肃的游戏设计,它使用系统生成的安全问题,目的是提高后备身份验证的可用性。为此,我们采用了流行的基于图片的“4图1字”手机游戏。这个游戏之所以被选中,是因为它使用了图片和线索,之前的心理学研究发现,这对提高记忆力至关重要。这个游戏要求用户挑选与给定图片相关的单词。然后,我们通过添加有助于最大限度地提高以下记忆检索技能的功能来定制这个游戏:(a)口头提示-通过提供口头描述的提示;(b)空间线索-通过保持相同的图片顺序;(c)图形提示-每次挑战显示4张图像;(d)游戏的互动性/吸引力。
{"title":"Changing users' security behaviour towards security questions: A game based learning approach","authors":"Nicholas Micallef, N. Arachchilage","doi":"10.1109/MILCIS.2017.8190424","DOIUrl":"https://doi.org/10.1109/MILCIS.2017.8190424","url":null,"abstract":"Fallback authentication is used to retrieve forgotten passwords. Security questions are one of the main techniques used to conduct fallback authentication. In this paper, we propose a serious game design that uses system-generated security questions with the aim of improving the usability of fallback authentication. For this purpose, we adopted the popular picture-based ‘4 Pics 1 word’ mobile game. This game was selected because of its use of pictures and cues, which previous psychology research found to be crucial to aid memorability. This game asks users to pick the word that relates to the given pictures. We then customized this game by adding features which help maximize the following memory retrieval skills: (a) verbal cues — by providing hints with verbal descriptions; (b) spatial cues — by maintaining the same order of pictures; (c) graphical cues — by showing 4 images for each challenge; (d) interactivity/engaging nature of the game.","PeriodicalId":227691,"journal":{"name":"2017 Military Communications and Information Systems Conference (MilCIS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131590556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2017 Military Communications and Information Systems Conference (MilCIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1