首页 > 最新文献

2009 Fifth International Conference on Information Assurance and Security最新文献

英文 中文
Building Trust Territory in Ad Hoc Networks 在Ad Hoc网络中建立信任区域
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.235
Yuan Bai, Xing Zhang, Bin Sun
Building trust has been recognized as a new security approach for wireless distributed networks. In the paper, we try to provide a completely new view by building trust territory in ad hoc networks. The concept of trust territory is addressed and the approach to build trust territory is also discussed. A trust territory contains all nodes trusted by the node. It is considered secure to communicate with nodes in the trust territories. Theories of sets, relations and graphs help to build trust territories. Trust territory could work in all layers of networks, so its potential for future applications is very promising.
建立信任已被公认为无线分布式网络安全的新途径。在本文中,我们试图通过在自组织网络中建立信任区域来提供一个全新的观点。讨论了信任领域的概念,并讨论了建立信任领域的方法。信任区域包含该节点信任的所有节点。与托管区域内的节点通信被认为是安全的。集合、关系和图的理论有助于建立信任领域。信任区域可以在所有网络层中工作,因此其未来应用的潜力非常大。
{"title":"Building Trust Territory in Ad Hoc Networks","authors":"Yuan Bai, Xing Zhang, Bin Sun","doi":"10.1109/IAS.2009.235","DOIUrl":"https://doi.org/10.1109/IAS.2009.235","url":null,"abstract":"Building trust has been recognized as a new security approach for wireless distributed networks. In the paper, we try to provide a completely new view by building trust territory in ad hoc networks. The concept of trust territory is addressed and the approach to build trust territory is also discussed. A trust territory contains all nodes trusted by the node. It is considered secure to communicate with nodes in the trust territories. Theories of sets, relations and graphs help to build trust territories. Trust territory could work in all layers of networks, so its potential for future applications is very promising.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115718461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Accurate Image Juggling Authentication Algorithm 一种精确的图像杂耍认证算法
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.274
Jianquan Xie, Qing Xie, Chunhua Yang
A fragile watermarking algorithm used in accurate tamper authentication of image content is proposed. The algorithm can distinguish tampered pixel points accurately and tolerate transmission error of individual authentication information bits which take place in image transmission. This algorithm produces authentication information by expanding more pixels within four-left, right, up and down directions around the pixel, then the problem that single tampered pixel point can’t be located accurately which cause by some algorithms based on image uncertainty by combining surrounding pixels to locate embedded watermarking bits. Authentication information is embedded after encryption to resolve security vulnerability problem appears in most pixel-level authentic algorithm.
提出了一种用于图像内容精确篡改认证的脆弱水印算法。该算法能准确区分篡改像素点,并能容忍图像传输过程中出现的个别认证信息位的传输错误。该算法通过在像素周围的左、右、上、下四个方向上扩展更多的像素来产生认证信息,解决了一些基于图像不确定性的算法通过结合周围像素来定位嵌入的水印位而导致单个篡改像素点无法准确定位的问题。在加密后嵌入认证信息,解决了大多数像素级认证算法存在的安全漏洞问题。
{"title":"An Accurate Image Juggling Authentication Algorithm","authors":"Jianquan Xie, Qing Xie, Chunhua Yang","doi":"10.1109/IAS.2009.274","DOIUrl":"https://doi.org/10.1109/IAS.2009.274","url":null,"abstract":"A fragile watermarking algorithm used in accurate tamper authentication of image content is proposed. The algorithm can distinguish tampered pixel points accurately and tolerate transmission error of individual authentication information bits which take place in image transmission. This algorithm produces authentication information by expanding more pixels within four-left, right, up and down directions around the pixel, then the problem that single tampered pixel point can’t be located accurately which cause by some algorithms based on image uncertainty by combining surrounding pixels to locate embedded watermarking bits. Authentication information is embedded after encryption to resolve security vulnerability problem appears in most pixel-level authentic algorithm.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125256280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Approach to Group Decision Making Based on Incomplete Linguistic Preference Relations 基于不完全语言偏好关系的群体决策方法
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.204
Tien-Chin Wang, S. Peng, S. Hsu, Jui-Fang Chang
This study not only applies Multi-Criteria Decision Making with Incomplete Linguistic model (InlinPreRa) and uses horizontal, vertical and oblique pairwise comparison algorithms to construct but also expansion group decision making model. When the decision maker is carrying out the pairwise comparison, the following problems can be avoided: time pressure, lack of complete information, the decision maker is lack of this professional knowledge, or the information provided is unreal and thus it is difficult to obtain information.
本研究运用inlinpreera多准则决策模型(Multi-Criteria Decision Making with Incomplete Linguistic model, inlinpreera),并运用水平、垂直和倾斜的两两比较算法构建和扩展群体决策模型。当决策者进行两两比较时,可以避免以下问题:时间紧迫,信息不完整,决策者缺乏该专业知识,或者提供的信息不真实,难以获得信息。
{"title":"An Approach to Group Decision Making Based on Incomplete Linguistic Preference Relations","authors":"Tien-Chin Wang, S. Peng, S. Hsu, Jui-Fang Chang","doi":"10.1109/IAS.2009.204","DOIUrl":"https://doi.org/10.1109/IAS.2009.204","url":null,"abstract":"This study not only applies Multi-Criteria Decision Making with Incomplete Linguistic model (InlinPreRa) and uses horizontal, vertical and oblique pairwise comparison algorithms to construct but also expansion group decision making model. When the decision maker is carrying out the pairwise comparison, the following problems can be avoided: time pressure, lack of complete information, the decision maker is lack of this professional knowledge, or the information provided is unreal and thus it is difficult to obtain information.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131596428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks 一种高效的移动Ad Hoc网络匿名路由协议
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.267
Xiaoqing Li, Hui Li, Jianfeng Ma, Weidong Zhang
Providing anonymous routing in mobile ad hoc networks (MANET) has been a hot issue for the purpose of security and privacy concerns. But there are very few have been done about providing a valid method to detect malicious node and providing a trustworthy protection over whole network. In this paper, we introduce a localized trust management which can primarily remove malicious nodes, and propose an efficient anonymous routing protocol by node that participates in the protocol encrypts entire message with trust key and says Hello to its ancestor within expiration time. It makes malicious node can be detected and isolated from the network. In this way, a anonymous and secure route path can be established in a hostile environment. Meanwhile, it is able to efficiently against the Denial-of-Service (DoS) attack.
在移动自组织网络(MANET)中提供匿名路由一直是安全和隐私问题的热点问题。但是,在提供一种有效的方法来检测恶意节点并在整个网络中提供可靠的保护方面,研究还很少。在本文中,我们引入了一种本地化的信任管理方法,可以主要去除恶意节点,并提出了一种高效的匿名路由协议,该协议通过参与节点对整个消息进行信任密钥加密,并在有效时间内对其祖先说Hello。它使恶意节点能够被检测到并与网络隔离。通过这种方式,可以在恶意环境下建立匿名、安全的路由路径。同时,能够有效地抵御DoS (Denial-of-Service)攻击。
{"title":"An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks","authors":"Xiaoqing Li, Hui Li, Jianfeng Ma, Weidong Zhang","doi":"10.1109/IAS.2009.267","DOIUrl":"https://doi.org/10.1109/IAS.2009.267","url":null,"abstract":"Providing anonymous routing in mobile ad hoc networks (MANET) has been a hot issue for the purpose of security and privacy concerns. But there are very few have been done about providing a valid method to detect malicious node and providing a trustworthy protection over whole network. In this paper, we introduce a localized trust management which can primarily remove malicious nodes, and propose an efficient anonymous routing protocol by node that participates in the protocol encrypts entire message with trust key and says Hello to its ancestor within expiration time. It makes malicious node can be detected and isolated from the network. In this way, a anonymous and secure route path can be established in a hostile environment. Meanwhile, it is able to efficiently against the Denial-of-Service (DoS) attack.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131462345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A Variational Model Combining Curvelet Shrinkage and Nonlinear Anisotropic Diffusion for Image Denoising 结合曲线收缩和非线性各向异性扩散的图像去噪变分模型
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.155
Weibin Zhang, Wenjuan Zhang
In this paper, we propose a new variational model for image denoising, which contains two regularizing term. One regularizing term is BV norm, another is formulated in terms of summation in curvelet domain. Solving this new variational model results in an iterative algorithm, which combines naturally Curvelet shrinkage with nonlinear anisotropic diffusion equations. Numerical examples show that the proposed method has good performances for image denoising.
本文提出了一种包含两个正则化项的图像去噪变分模型。一个正则化项是BV范数,另一个正则化项是曲线域中的求和。求解该变分模型的迭代算法将自然曲线收缩与非线性各向异性扩散方程相结合。数值算例表明,该方法具有较好的图像去噪效果。
{"title":"A Variational Model Combining Curvelet Shrinkage and Nonlinear Anisotropic Diffusion for Image Denoising","authors":"Weibin Zhang, Wenjuan Zhang","doi":"10.1109/IAS.2009.155","DOIUrl":"https://doi.org/10.1109/IAS.2009.155","url":null,"abstract":"In this paper, we propose a new variational model for image denoising, which contains two regularizing term. One regularizing term is BV norm, another is formulated in terms of summation in curvelet domain. Solving this new variational model results in an iterative algorithm, which combines naturally Curvelet shrinkage with nonlinear anisotropic diffusion equations. Numerical examples show that the proposed method has good performances for image denoising.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132563875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Common Friends Discovery with Privacy and Authenticity 共同的朋友发现与隐私和真实性
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.208
Shin-Yan Chiou, Shih-Ying Chang, Hung-Min Sun
In this paper, we propose a common friend discovery algorithm considering the privacy of users and the authenticity of friend relationships. The privacy means users’ other friends’ information does not be leaked except their common friends. The authenticity signifies anyone can not successfully claim he is a friend of someone unless he really is. It has many applications such as playing games by friends, finding talking-topics by strangers, finding introducer of job interview, finding matchmaker of someone you desire to know, etc. We consider its security and matching probability. We also implement the algorithm in two mobile phones to prove that it is workable.
在本文中,我们提出了一种考虑用户隐私和朋友关系真实性的普通朋友发现算法。隐私是指用户除共同好友外的其他好友信息不会被泄露。真实性意味着任何人都不能成功地声称自己是某人的朋友,除非他真的是。它有许多应用程序,如玩游戏的朋友,寻找聊天话题的陌生人,寻找工作面试的介绍人,寻找媒人的人,你想知道的,等等。考虑了其安全性和匹配概率。我们还在两部手机上实现了该算法,以证明该算法是可行的。
{"title":"Common Friends Discovery with Privacy and Authenticity","authors":"Shin-Yan Chiou, Shih-Ying Chang, Hung-Min Sun","doi":"10.1109/IAS.2009.208","DOIUrl":"https://doi.org/10.1109/IAS.2009.208","url":null,"abstract":"In this paper, we propose a common friend discovery algorithm considering the privacy of users and the authenticity of friend relationships. The privacy means users’ other friends’ information does not be leaked except their common friends. The authenticity signifies anyone can not successfully claim he is a friend of someone unless he really is. It has many applications such as playing games by friends, finding talking-topics by strangers, finding introducer of job interview, finding matchmaker of someone you desire to know, etc. We consider its security and matching probability. We also implement the algorithm in two mobile phones to prove that it is workable.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132339722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Distributed Event-Triggered Trust Management for Wireless Sensor Networks 无线传感器网络的分布式事件触发信任管理
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.69
Sibo Liu, Liaojun Pang, Qingqi Pei, Hua Ma, Q. Peng
Trust management is an important issue in wireless sensor networks (WSNs). In this paper, we introduce the concept of trust and design a distributed event- triggered trust management model for WSNs. It combines cryptography, statistics, economics, data analysis and the other related fields. In this way, we can immediately identify and isolate the malice node, thereby creating a secure and reliable wireless sensor networks that can avoid some common attacks and ensure the security of the applications. And, we give the communication process and the computation model as well as how each trust management module works. So it is no longer a simple calculation model or a simple frame structure, and it has realistic feasibility and operability.
信任管理是无线传感器网络中的一个重要问题。本文引入了信任的概念,设计了一种基于事件触发的分布式无线传感器网络信任管理模型。它结合了密码学、统计学、经济学、数据分析和其他相关领域。通过这种方式,我们可以立即识别和隔离恶意节点,从而创建一个安全可靠的无线传感器网络,可以避免一些常见的攻击,确保应用程序的安全性。给出了通信过程和计算模型,以及各信任管理模块的工作原理。因此它不再是一个简单的计算模型或简单的框架结构,具有现实的可行性和可操作性。
{"title":"Distributed Event-Triggered Trust Management for Wireless Sensor Networks","authors":"Sibo Liu, Liaojun Pang, Qingqi Pei, Hua Ma, Q. Peng","doi":"10.1109/IAS.2009.69","DOIUrl":"https://doi.org/10.1109/IAS.2009.69","url":null,"abstract":"Trust management is an important issue in wireless sensor networks (WSNs). In this paper, we introduce the concept of trust and design a distributed event- triggered trust management model for WSNs. It combines cryptography, statistics, economics, data analysis and the other related fields. In this way, we can immediately identify and isolate the malice node, thereby creating a secure and reliable wireless sensor networks that can avoid some common attacks and ensure the security of the applications. And, we give the communication process and the computation model as well as how each trust management module works. So it is no longer a simple calculation model or a simple frame structure, and it has realistic feasibility and operability.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132444532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Generalized Analysis Model of Information Security of Computer System Based on Electromagnetic Topology 基于电磁拓扑的计算机系统信息安全广义分析模型
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.306
Jin Tian, Y. Qiu, Ankun Lin
According to the character of the typical serial information leakage and the feature in the information leakage problem that multiple points (zone) converge and couple toward one point (zone), several key concepts, such as the emission zone, transmission zone and receiving zone, are defined in this paper. Based on the idea of electromagnetic topology, a completely new construction method of system topological graph is proposed. Then, this method is applied to analyze a simplified serial information leakage system, the generalized transmission coupling model is also established. What’s more, the modeling process of field-to-field coupling is discussed emphatically. Therefore a solid foundation is laid for the electromagnetic topology analysis of serial information leakage.
根据典型串行信息泄漏的特点和信息泄漏问题中多点(区)向一点(区)收敛耦合的特点,定义了发射区、发射区和接收区等几个关键概念。基于电磁拓扑学思想,提出了一种全新的系统拓扑图构造方法。然后,将该方法应用于一个简化的串行信息泄漏系统的分析,建立了广义传输耦合模型。重点讨论了场对场耦合的建模过程。从而为串行信息泄漏的电磁拓扑分析奠定了坚实的基础。
{"title":"Generalized Analysis Model of Information Security of Computer System Based on Electromagnetic Topology","authors":"Jin Tian, Y. Qiu, Ankun Lin","doi":"10.1109/IAS.2009.306","DOIUrl":"https://doi.org/10.1109/IAS.2009.306","url":null,"abstract":"According to the character of the typical serial information leakage and the feature in the information leakage problem that multiple points (zone) converge and couple toward one point (zone), several key concepts, such as the emission zone, transmission zone and receiving zone, are defined in this paper. Based on the idea of electromagnetic topology, a completely new construction method of system topological graph is proposed. Then, this method is applied to analyze a simplified serial information leakage system, the generalized transmission coupling model is also established. What’s more, the modeling process of field-to-field coupling is discussed emphatically. Therefore a solid foundation is laid for the electromagnetic topology analysis of serial information leakage.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"313 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133224380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hardware/Software Codesign of Resource Constrained Real-Time Systems 资源受限实时系统的软硬件协同设计
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.19
Chia-Cheng Lo, Jung-Guan Luo, Ming-Der Shieh
System-level design methods can provide a systematic and effective way of evaluating various design options, thus shortening the product development time. This paper relaxes the HC algorithm by considering the K best candidates in each clustering iteration to alleviate the possibility of being trapped in local minimum during hardware/software (HW/SW) partition. We also present an architecture mapping algorithm together with the defined sensitivity measure to further reduce the hardware requirement. Simulation results show that the complexity of exploration time can be greatly reduced with only little performance loss as compared to the exhaustive search. The proposed algorithm can thus provide a good compromise between exploration time and accuracy.
系统级设计方法可以提供一种系统有效的方法来评估各种设计方案,从而缩短产品开发时间。本文通过在每次聚类迭代中考虑K个最佳候选者来放宽HC算法,以减轻在硬件/软件(HW/SW)划分时陷入局部最小值的可能性。我们还提出了一种架构映射算法和定义的灵敏度度量,以进一步降低硬件要求。仿真结果表明,与穷举搜索相比,该方法可以大大降低搜索时间的复杂度,而性能损失很小。因此,该算法可以在探测时间和精度之间提供一个很好的折衷。
{"title":"Hardware/Software Codesign of Resource Constrained Real-Time Systems","authors":"Chia-Cheng Lo, Jung-Guan Luo, Ming-Der Shieh","doi":"10.1109/IAS.2009.19","DOIUrl":"https://doi.org/10.1109/IAS.2009.19","url":null,"abstract":"System-level design methods can provide a systematic and effective way of evaluating various design options, thus shortening the product development time. This paper relaxes the HC algorithm by considering the K best candidates in each clustering iteration to alleviate the possibility of being trapped in local minimum during hardware/software (HW/SW) partition. We also present an architecture mapping algorithm together with the defined sensitivity measure to further reduce the hardware requirement. Simulation results show that the complexity of exploration time can be greatly reduced with only little performance loss as compared to the exhaustive search. The proposed algorithm can thus provide a good compromise between exploration time and accuracy.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121669423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intrusion Detection System for Network Storage Based on System Calls 基于系统调用的网络存储入侵检测系统
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.100
Li-zhong Geng, Hui-bo Jia
Rapid increase of information resources speeds the development of network storage. And security of network storage satisfies the demands of privacy and safety of the information. Data encryption and personal identity authentication which are based on cryptography can protect the storage against non-authorized access, while they are ineffective for malicious authorized users and inherent attacks. Also heavy performances affect the control of storage. This paper demonstrates an efficient intrusion detection system model for network-attached storage based on system calls and improves the Process Homeostasis to realize the implementation. The experimental results demonstrate high detection rate and low false detection rate. The total performance is about 3% additions when the detection system is running normally.
信息资源的快速增长加速了网络存储的发展。网络存储的安全性满足了信息的私密性和安全性的要求。基于密码学的数据加密和个人身份认证可以保护存储免受未经授权的访问,但对恶意授权用户和固有攻击无效。此外,繁重的性能会影响对存储的控制。本文提出了一种基于系统调用的高效的网络附加存储入侵检测系统模型,并对进程稳态进行了改进以实现该模型。实验结果表明,该方法检测率高,误检率低。检测系统正常运行时,总性能提高3%左右。
{"title":"An Intrusion Detection System for Network Storage Based on System Calls","authors":"Li-zhong Geng, Hui-bo Jia","doi":"10.1109/IAS.2009.100","DOIUrl":"https://doi.org/10.1109/IAS.2009.100","url":null,"abstract":"Rapid increase of information resources speeds the development of network storage. And security of network storage satisfies the demands of privacy and safety of the information. Data encryption and personal identity authentication which are based on cryptography can protect the storage against non-authorized access, while they are ineffective for malicious authorized users and inherent attacks. Also heavy performances affect the control of storage. This paper demonstrates an efficient intrusion detection system model for network-attached storage based on system calls and improves the Process Homeostasis to realize the implementation. The experimental results demonstrate high detection rate and low false detection rate. The total performance is about 3% additions when the detection system is running normally.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116603087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2009 Fifth International Conference on Information Assurance and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1