首页 > 最新文献

2009 Fifth International Conference on Information Assurance and Security最新文献

英文 中文
A Database Protection System Aiming at SQL Attack 针对SQL攻击的数据库保护系统
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.322
Liwu Deng, Ruzhi Xu, Lizheng Jiang, Guangjuan Lv
Many websites on the internet are based on database, especially websites which use database to display the pages actively such as ASP, PHP and JSP. However, because of SQL attack, people pay much attention to the security of database on the internet. Different from many protection systems deployed between web servers and internet, this article designed a database protection system between web server and database server. It parses network and database protocol of the packets passing through, and extracts the SQL statements, then analyzes and filters the SQL statements, so it protects the database effectively on the application layer and its effectiveness is independent of any particular target system, application environment, or DBMS. Even there is no need to modify the source code of existing web applications. This system has been carried out in application and has good effect.
internet上的许多网站都是基于数据库的,尤其是ASP、PHP、JSP等利用数据库主动显示页面的网站。然而,由于SQL的攻击,互联网上数据库的安全问题越来越受到人们的关注。不同于许多部署在web服务器和internet之间的数据库保护系统,本文设计了一个web服务器和数据库服务器之间的数据库保护系统。它对经过的数据包的网络和数据库协议进行解析,提取SQL语句,然后对SQL语句进行分析和过滤,从而在应用层有效地保护数据库,其有效性不依赖于任何特定的目标系统、应用环境或DBMS。甚至不需要修改现有web应用程序的源代码。该系统在实际应用中取得了良好的效果。
{"title":"A Database Protection System Aiming at SQL Attack","authors":"Liwu Deng, Ruzhi Xu, Lizheng Jiang, Guangjuan Lv","doi":"10.1109/IAS.2009.322","DOIUrl":"https://doi.org/10.1109/IAS.2009.322","url":null,"abstract":"Many websites on the internet are based on database, especially websites which use database to display the pages actively such as ASP, PHP and JSP. However, because of SQL attack, people pay much attention to the security of database on the internet. Different from many protection systems deployed between web servers and internet, this article designed a database protection system between web server and database server. It parses network and database protocol of the packets passing through, and extracts the SQL statements, then analyzes and filters the SQL statements, so it protects the database effectively on the application layer and its effectiveness is independent of any particular target system, application environment, or DBMS. Even there is no need to modify the source code of existing web applications. This system has been carried out in application and has good effect.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122286992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Improving of IKE with PSK for Using in Mobile Computing Environments 用PSK改进IKE在移动计算环境中的应用
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.117
Dingguo Yu, Nan Chen
The rapid increase in using mobile communication networks for transmitting confidential data and conducting commercial transactions such as mobile e-commerce is creating large demands in designing secure mobile business systems. However, the mobile devices and mobile communication network have some weakness. It can cause some problems using traditional VPN technologies in mobile computing environments immediately. Currently, mobile users’ authentication in IKE is being done using certificates or PSK with aggressive mode commonly. They have serious security related issues (for PSK with aggressive mode) and need high deployment and maintain cost (for certificates). In this paper, we propose a new approach that is based on PSK where the IKE negotiation phase is modified for using in mobile computing environments. The modified IKE consists of four messages, and the responder doesn’t need to store any state while receiving message 1. It uses strong cookies and pre-calculated DHpp stack, etc technologies to counter IP flooding attacks and Man-in-the-Middle DoS attacks, because it does not require the responder to perform heavy computations before the initiator has authenticated itself. Otherwise, for one mobile user, it has a group of PSKs to be random selected, and the initiator and responder exchange identity info and agree on PSK with Hash (PSK-ID|IDi) or Hash (PSK-ID|IDr) info. Therefore, it provides the initiator and responder’s identity protection and prevention of passive dictionary based attacks on pre-shared keys.
随着使用移动通信网络传输机密数据和进行移动电子商务等商业交易的迅速增加,对设计安全的移动商务系统提出了很大的要求。然而,移动设备和移动通信网络存在一些弱点。在移动计算环境中使用传统VPN技术会立即引起一些问题。目前,移动用户在IKE中的身份验证通常采用证书或具有野蛮模式的PSK进行。它们有严重的安全相关问题(对于具有攻击模式的PSK),并且需要很高的部署和维护成本(对于证书)。在本文中,我们提出了一种基于PSK的新方法,其中修改了IKE协商阶段以用于移动计算环境。修改后的IKE由四条消息组成,响应方在接收消息1时不需要存储任何状态。它使用强大的cookie和预计算的DHpp堆栈等技术来对抗IP洪水攻击和中间人DoS攻击,因为它不需要响应者在发起者验证自己之前执行大量的计算。否则,对于一个移动用户,它有一组随机选择的PSK,发起者和响应者通过Hash (PSK- id |IDi)或Hash (PSK- id |IDr) info交换身份信息并对PSK达成一致。因此,它提供了发起者和响应者的身份保护和防止基于被动字典的预共享密钥攻击。
{"title":"The Improving of IKE with PSK for Using in Mobile Computing Environments","authors":"Dingguo Yu, Nan Chen","doi":"10.1109/IAS.2009.117","DOIUrl":"https://doi.org/10.1109/IAS.2009.117","url":null,"abstract":"The rapid increase in using mobile communication networks for transmitting confidential data and conducting commercial transactions such as mobile e-commerce is creating large demands in designing secure mobile business systems. However, the mobile devices and mobile communication network have some weakness. It can cause some problems using traditional VPN technologies in mobile computing environments immediately. Currently, mobile users’ authentication in IKE is being done using certificates or PSK with aggressive mode commonly. They have serious security related issues (for PSK with aggressive mode) and need high deployment and maintain cost (for certificates). In this paper, we propose a new approach that is based on PSK where the IKE negotiation phase is modified for using in mobile computing environments. The modified IKE consists of four messages, and the responder doesn’t need to store any state while receiving message 1. It uses strong cookies and pre-calculated DHpp stack, etc technologies to counter IP flooding attacks and Man-in-the-Middle DoS attacks, because it does not require the responder to perform heavy computations before the initiator has authenticated itself. Otherwise, for one mobile user, it has a group of PSKs to be random selected, and the initiator and responder exchange identity info and agree on PSK with Hash (PSK-ID|IDi) or Hash (PSK-ID|IDr) info. Therefore, it provides the initiator and responder’s identity protection and prevention of passive dictionary based attacks on pre-shared keys.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114068956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved SPECK Image Coding Algorithm 一种改进的斑点图像编码算法
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.201
Baojun Han, Yan Liu
Among so much embedded image coding algorithms, the SPECK algorithm gains more and more applications for it’s special features. But considering some disadvantages, An improved SPECK algorithm is presented in this dissertation, Besides the high coding efficiency, the improved algorithm preserves the properties of the SPECK. The experimental results show that the coding efficiency can be further improved and the computational complexity can be lowered by the improved SPECK algorithm.
在众多嵌入式图像编码算法中,SPECK算法以其独特的特性获得了越来越多的应用。但考虑到该算法存在的不足,本文提出了一种改进的SPECK算法,该算法在保留了SPECK编码特性的基础上,提高了编码效率。实验结果表明,改进后的SPECK算法可以进一步提高编码效率,降低计算复杂度。
{"title":"An Improved SPECK Image Coding Algorithm","authors":"Baojun Han, Yan Liu","doi":"10.1109/IAS.2009.201","DOIUrl":"https://doi.org/10.1109/IAS.2009.201","url":null,"abstract":"Among so much embedded image coding algorithms, the SPECK algorithm gains more and more applications for it’s special features. But considering some disadvantages, An improved SPECK algorithm is presented in this dissertation, Besides the high coding efficiency, the improved algorithm preserves the properties of the SPECK. The experimental results show that the coding efficiency can be further improved and the computational complexity can be lowered by the improved SPECK algorithm.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115948196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Watermarking Scheme Based on Two-dimensional Wavelet Filter Parametrization 一种基于二维小波滤波器参数化的水印方案
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.136
Guosheng Cheng, Jianwei Yang
In this paper, a parametrization of two-dimensional wavelet filter system is used as a method to protect wavelet-based watermarks against unauthorized detection. This system is developed in terms of a novel transformation-Shift Unitary transform (SUT) of Conjugate Quadrature filter (CQF). The commonly used wavelet filters are only special cases of this system. Based on this system, a watermarking scheme is described to embed watermark into low frequency sub-bands of wavelet transformation. We overcome degradation problem by performing median filtering to the lowest frequency sub-band of wavelet transform and embed watermark into visually insensitive locations. Experiments show this method is robust to compression,median-filtering etc.
本文采用二维小波滤波系统的参数化方法来保护基于小波的水印不被非法检测。该系统是根据共轭正交滤波器(CQF)的一种新颖变换——移位酉变换(SUT)而开发的。常用的小波滤波器只是该系统的特殊情况。在此基础上,提出了一种将水印嵌入小波变换的低频子带的水印方案。通过对小波变换的最低频率子带进行中值滤波,将水印嵌入到视觉不敏感的位置,克服了水印的退化问题。实验表明,该方法对压缩、中值滤波等具有较强的鲁棒性。
{"title":"A Watermarking Scheme Based on Two-dimensional Wavelet Filter Parametrization","authors":"Guosheng Cheng, Jianwei Yang","doi":"10.1109/IAS.2009.136","DOIUrl":"https://doi.org/10.1109/IAS.2009.136","url":null,"abstract":"In this paper, a parametrization of two-dimensional wavelet filter system is used as a method to protect wavelet-based watermarks against unauthorized detection. This system is developed in terms of a novel transformation-Shift Unitary transform (SUT) of Conjugate Quadrature filter (CQF). The commonly used wavelet filters are only special cases of this system. Based on this system, a watermarking scheme is described to embed watermark into low frequency sub-bands of wavelet transformation. We overcome degradation problem by performing median filtering to the lowest frequency sub-band of wavelet transform and embed watermark into visually insensitive locations. Experiments show this method is robust to compression,median-filtering etc.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"456 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121170488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security Analysis of the Kerberos Protocol Using BAN Logic 基于BAN逻辑的Kerberos协议安全性分析
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.320
K. Fan, Hui Li, Yue Wang
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the users. So a security analysis of the Kerberos protocol using BAN logic is proposed in this paper, and the reliability, practicability and security of Kerberos protocol are proved.
Kerberos协议是一种著名的身份认证协议,作为一种标准在网络中得到了广泛的应用。但是目前还没有一个严格的基于形式方法的证明。这对用户来说是非常紧张的。为此,本文采用BAN逻辑对Kerberos协议进行了安全性分析,证明了Kerberos协议的可靠性、实用性和安全性。
{"title":"Security Analysis of the Kerberos Protocol Using BAN Logic","authors":"K. Fan, Hui Li, Yue Wang","doi":"10.1109/IAS.2009.320","DOIUrl":"https://doi.org/10.1109/IAS.2009.320","url":null,"abstract":"Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the users. So a security analysis of the Kerberos protocol using BAN logic is proposed in this paper, and the reliability, practicability and security of Kerberos protocol are proved.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121659858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Detecting DoS and DDoS Attacks by Using an Intrusion Detection and Remote Prevention System 利用入侵检测和远程防御系统检测DoS和DDoS攻击
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.294
Fang-Yie Leu, Zhi-Yang Li
In this article, we proposed an intrusion prevention system, named Cumulative-Sum-based Intrusion Prevention System (CSIPS) which detects malicious behaviors, attacks and distributed attacks launched to remote clients and local hosts based on the Cumulative Sum (CUSUM) algorithm. Experimental results show that CSIPSs in a united defense environment can carry out a higher security level for the environment.
本文提出了一种基于累积和算法的入侵防御系统CSIPS (Cumulative-Sum-based intrusion prevention system),该系统基于累积和算法对远程客户端和本地主机发起的恶意行为、攻击和分布式攻击进行检测。实验结果表明,在统一防御环境下,CSIPSs可以实现更高的环境安全级别。
{"title":"Detecting DoS and DDoS Attacks by Using an Intrusion Detection and Remote Prevention System","authors":"Fang-Yie Leu, Zhi-Yang Li","doi":"10.1109/IAS.2009.294","DOIUrl":"https://doi.org/10.1109/IAS.2009.294","url":null,"abstract":"In this article, we proposed an intrusion prevention system, named Cumulative-Sum-based Intrusion Prevention System (CSIPS) which detects malicious behaviors, attacks and distributed attacks launched to remote clients and local hosts based on the Cumulative Sum (CUSUM) algorithm. Experimental results show that CSIPSs in a united defense environment can carry out a higher security level for the environment.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123744782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Economical Dental Stereoradiography in Digital Era 数字时代的经济牙科立体放射成像
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.168
Hsien-Huang P. Wu, Shih-Hsin Chang, P. Weng, Soon-Lin Chen
Because of the prevalence of digital imaging in radiology and the developments of electronic three-dimensional (3D) viewing devices, digital stereoradiography will become an efficient and economical way for improving the diagnostic efficacy. A viewing device based on one compact mirror and two flat-panel LCDs to achieve high resolution of digital dental stereoradiography is proposed and its effectiveness was evaluated. The proposed viewing method shows better performance compared with the other two approaches. Clinical use of the viewing instruments can be expected to show similar results.
由于数字成像在放射学中的普及和电子三维观察设备的发展,数字立体放射成像将成为提高诊断效果的一种有效而经济的方法。提出了一种基于一个小型反射镜和两个平板液晶显示器的高分辨率数字口腔立体放射成像观看装置,并对其效果进行了评价。与其他两种方法相比,该方法具有更好的性能。临床使用的观察仪器可以预期显示类似的结果。
{"title":"Economical Dental Stereoradiography in Digital Era","authors":"Hsien-Huang P. Wu, Shih-Hsin Chang, P. Weng, Soon-Lin Chen","doi":"10.1109/IAS.2009.168","DOIUrl":"https://doi.org/10.1109/IAS.2009.168","url":null,"abstract":"Because of the prevalence of digital imaging in radiology and the developments of electronic three-dimensional (3D) viewing devices, digital stereoradiography will become an efficient and economical way for improving the diagnostic efficacy. A viewing device based on one compact mirror and two flat-panel LCDs to achieve high resolution of digital dental stereoradiography is proposed and its effectiveness was evaluated. The proposed viewing method shows better performance compared with the other two approaches. Clinical use of the viewing instruments can be expected to show similar results.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123798199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Words Clustering Based on Keywords Indexing from Large-scale Categorization Corpora 基于大规模分类语料库关键词索引的词聚类
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.271
Liu Hua
Keywords are indexed automatically for large-scale categorization corpora. Indexed keywords of more than 20 documents are selected as seed words, thus overcoming subjectivity of selecting seed words in clustering; at the same time, clustering is limited to particular category corpora and keywords indexed feature extraction method is adopted to obtain domanial words automatically, thus reducing noise of similarity calculation
对于大规模的分类语料库,关键词是自动索引的。选取20余篇文献的索引关键词作为种子词,克服了聚类中选择种子词的主观性;同时,将聚类限制在特定的类别语料库中,采用关键词索引特征提取方法自动获取领域词,从而降低了相似度计算的噪声
{"title":"Words Clustering Based on Keywords Indexing from Large-scale Categorization Corpora","authors":"Liu Hua","doi":"10.1109/IAS.2009.271","DOIUrl":"https://doi.org/10.1109/IAS.2009.271","url":null,"abstract":"Keywords are indexed automatically for large-scale categorization corpora. Indexed keywords of more than 20 documents are selected as seed words, thus overcoming subjectivity of selecting seed words in clustering; at the same time, clustering is limited to particular category corpora and keywords indexed feature extraction method is adopted to obtain domanial words automatically, thus reducing noise of similarity calculation","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123863338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cryptoanalysis of Two Signcryption Schemes 两种签名加密方案的密码分析
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.101
Jianhong Zhang, Qin Geng
Certificateless PKC and self-certified PKC are two new public key systems. They remove the necessity of certificate to ensure the authentication of the user's public key in CB-PKC and also overcome the inherent key escrow problem in IB-PKC. Recently, Zhang et.al proposed a self-certified signcryption scheme, and Wu et.al gave a certificateless signcryption scheme. However, in this paper, we analyze the security of Zhangemph{ et.al}'s self-certified signcryption scheme and Wu emph{et.al} certificateless signcryption scheme, and show that the two signcryption schemes are insecure though the two schemes were proven to be secure under the random oracle model in cite{mu} and cite{wu}. In the self-certified signcryption scheme, a malicious user can forge a signcryption on an arbitrary message $m$ without CA's authentication. In Wuemph{et.al}'s certificateless signcryption scheme, confidentiality of signcryption is not satisfied. Namely, the scheme is not against chosen ciphertext attack. Finally, we give the corresponding attack,and to overcome the above flaws, we also discuss the corresponding improved method, respectively.
无证书PKC和自认证PKC是两种新的公钥系统。它消除了CB-PKC中使用证书来保证用户公钥认证的必要性,也克服了IB-PKC中固有的密钥托管问题。最近,Zhang等人提出了一种自认证签名加密方案,Wu等人提出了一种无证书签名加密方案。然而,本文分析了Zhang emph{ 等等。}的自认证签名加密方案和Wu emph{等等。}的无证书签名加密方案的安全性,并证明了这两种签名加密方案是不安全的,尽管这两种方案在cite{mu}和cite{wu}的随机oracle模型下证明了它们的安全性。在自认证签名加密方案中,恶意用户可以在任意消息$m$上伪造签名加密,而无需CA的认证。在emph{好吧。}的无证书签名加密方案中,签名加密的保密性不能得到满足。也就是说,该方案不反对所选密文攻击。最后给出了相应的攻击方法,并针对上述缺陷分别讨论了相应的改进方法。
{"title":"Cryptoanalysis of Two Signcryption Schemes","authors":"Jianhong Zhang, Qin Geng","doi":"10.1109/IAS.2009.101","DOIUrl":"https://doi.org/10.1109/IAS.2009.101","url":null,"abstract":"Certificateless PKC and self-certified PKC are two new public key systems. They remove the necessity of certificate to ensure the authentication of the user's public key in CB-PKC and also overcome the inherent key escrow problem in IB-PKC. Recently, Zhang et.al proposed a self-certified signcryption scheme, and Wu et.al gave a certificateless signcryption scheme. However, in this paper, we analyze the security of Zhangemph{ et.al}'s self-certified signcryption scheme and Wu emph{et.al} certificateless signcryption scheme, and show that the two signcryption schemes are insecure though the two schemes were proven to be secure under the random oracle model in cite{mu} and cite{wu}. In the self-certified signcryption scheme, a malicious user can forge a signcryption on an arbitrary message $m$ without CA's authentication. In Wuemph{et.al}'s certificateless signcryption scheme, confidentiality of signcryption is not satisfied. Namely, the scheme is not against chosen ciphertext attack. Finally, we give the corresponding attack,and to overcome the above flaws, we also discuss the corresponding improved method, respectively.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121526122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Research of Simulation for Network Security Based on System Dynamics 基于系统动力学的网络安全仿真研究
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.251
Hong-shan Kong, Ming-qing Zhang, Jun Tang, Chang-yuan Luo
Network security is attracting more and more attention. Simulation is a better choice to research the problems of network security because of their high complexity. Based on the purpose and actuality of simulation of network security, this paper puts forward a simulation method of network security using system dynamics. After giving the steps of system dynamics simulation of network security, this paper has simulated the attack of worm using system dynamics. The simulation results indicate system dynamics can describe the processes of worm attack well. The research of system dynamics of network security will extend the methods of simulation of network security.
网络安全越来越受到人们的重视。由于网络安全问题的高度复杂性,仿真是研究网络安全问题的较好选择。基于网络安全仿真的目的和现状,提出了一种基于系统动力学的网络安全仿真方法。在给出网络安全系统动力学仿真的步骤后,利用系统动力学对蠕虫的攻击进行了仿真。仿真结果表明,系统动力学可以很好地描述蠕虫攻击的过程。网络安全系统动力学的研究将扩展网络安全仿真的方法。
{"title":"The Research of Simulation for Network Security Based on System Dynamics","authors":"Hong-shan Kong, Ming-qing Zhang, Jun Tang, Chang-yuan Luo","doi":"10.1109/IAS.2009.251","DOIUrl":"https://doi.org/10.1109/IAS.2009.251","url":null,"abstract":"Network security is attracting more and more attention. Simulation is a better choice to research the problems of network security because of their high complexity. Based on the purpose and actuality of simulation of network security, this paper puts forward a simulation method of network security using system dynamics. After giving the steps of system dynamics simulation of network security, this paper has simulated the attack of worm using system dynamics. The simulation results indicate system dynamics can describe the processes of worm attack well. The research of system dynamics of network security will extend the methods of simulation of network security.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116781617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2009 Fifth International Conference on Information Assurance and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1