首页 > 最新文献

2011 Sixth International Conference on Availability, Reliability and Security最新文献

英文 中文
Responsibility-driven Design and Development of Process-aware Security Policies 责任驱动的过程感知安全策略的设计和开发
Maria Leitner, S. Rinderle-Ma, Juergen Mangler
Process-Aware Information Systems (PAIS) enable the automated support of business processes that are executed by a combination of human actors and systems. As processes typically require access to sensitive data, security policies are of high importance. Typically security policies in PAIS range from access rules and authorization constraints to context policies (location, time) and are scattered over the multitude of heterogeneous PAIS components, i.e. process models, repositories, organizational structures, etc. Currently, different approaches for modeling and enforcing security policies exist that assume a set of explicitly defined security policies. Because of aforementioned heterogeneity, these approaches are suboptimal for PAIS. In order to improve upon existing approaches we present a security policy data model and design methodology, based on the concept of responsibilities, permissions and constraints. The goal is to not only unify diverse security policies in different PAIS subsystems, but also to make security policies independent of these subsystems to restrain complexity from process modeling and evolution, and to allow for comprehensive security policy development and maintenance.
流程感知信息系统(PAIS)支持对由人类参与者和系统组合执行的业务流程的自动化支持。由于流程通常需要访问敏感数据,因此安全策略非常重要。通常,PAIS中的安全策略范围从访问规则和授权约束到上下文策略(位置、时间),并且分散在众多异构PAIS组件中,即流程模型、存储库、组织结构等。目前,存在不同的建模和执行安全策略的方法,这些方法假设一组显式定义的安全策略。由于前面提到的异质性,这些方法对于PAIS来说不是最优的。为了改进现有的方法,我们提出了一种基于责任、权限和约束概念的安全策略数据模型和设计方法。目标不仅是在不同的PAIS子系统中统一不同的安全策略,而且要使安全策略独立于这些子系统,以限制流程建模和进化的复杂性,并允许全面的安全策略开发和维护。
{"title":"Responsibility-driven Design and Development of Process-aware Security Policies","authors":"Maria Leitner, S. Rinderle-Ma, Juergen Mangler","doi":"10.1109/ARES.2011.56","DOIUrl":"https://doi.org/10.1109/ARES.2011.56","url":null,"abstract":"Process-Aware Information Systems (PAIS) enable the automated support of business processes that are executed by a combination of human actors and systems. As processes typically require access to sensitive data, security policies are of high importance. Typically security policies in PAIS range from access rules and authorization constraints to context policies (location, time) and are scattered over the multitude of heterogeneous PAIS components, i.e. process models, repositories, organizational structures, etc. Currently, different approaches for modeling and enforcing security policies exist that assume a set of explicitly defined security policies. Because of aforementioned heterogeneity, these approaches are suboptimal for PAIS. In order to improve upon existing approaches we present a security policy data model and design methodology, based on the concept of responsibilities, permissions and constraints. The goal is to not only unify diverse security policies in different PAIS subsystems, but also to make security policies independent of these subsystems to restrain complexity from process modeling and evolution, and to allow for comprehensive security policy development and maintenance.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121225049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security Policies in Adaptive Process-Aware Information Systems: Existing Approaches and Challenges 自适应过程感知信息系统中的安全策略:现有的方法和挑战
Maria Leitner
Enabling security is one of the key challenges in adaptive Process-Aware Information Systems (PAIS). Since automating business processes involves many participants, uses private and public data, and communicates with external services security becomes inevitable. In current systems, security is enforced by an access control model and supplementary constraints imposed on workflow activities. However, existing systems provide individual implementations for security policies (e.g. separation of duties) and leave out other constraints (e.g. inter-process constraints). What is missing is a systematic analysis of security policies in PAIS. Hence, in this paper, we display state of the art and provide a taxonomy of security policies in PAIS. Furthermore, a detailed analysis of research challenges and issues is presented. We will show that there are still shortcomings and identify important requirements for security in PAIS. We will also point out open questions related to specifying, modeling, and changing security policies which will provide a road map for future research.
实现安全性是自适应过程感知信息系统(PAIS)的关键挑战之一。由于自动化业务流程涉及许多参与者,使用私有和公共数据,并与外部服务通信,因此安全变得不可避免。在当前的系统中,安全性是通过访问控制模型和附加在工作流活动上的约束来实现的。然而,现有系统为安全策略提供了单独的实现(例如职责分离),而忽略了其他约束(例如进程间约束)。缺少的是对PAIS中安全策略的系统分析。因此,在本文中,我们展示了最新的技术,并提供了PAIS中安全策略的分类。此外,还详细分析了研究面临的挑战和问题。我们将展示PAIS中仍然存在的缺点,并确定对安全性的重要要求。我们还将指出与指定、建模和更改安全策略相关的开放问题,这将为未来的研究提供路线图。
{"title":"Security Policies in Adaptive Process-Aware Information Systems: Existing Approaches and Challenges","authors":"Maria Leitner","doi":"10.1109/ARES.2011.107","DOIUrl":"https://doi.org/10.1109/ARES.2011.107","url":null,"abstract":"Enabling security is one of the key challenges in adaptive Process-Aware Information Systems (PAIS). Since automating business processes involves many participants, uses private and public data, and communicates with external services security becomes inevitable. In current systems, security is enforced by an access control model and supplementary constraints imposed on workflow activities. However, existing systems provide individual implementations for security policies (e.g. separation of duties) and leave out other constraints (e.g. inter-process constraints). What is missing is a systematic analysis of security policies in PAIS. Hence, in this paper, we display state of the art and provide a taxonomy of security policies in PAIS. Furthermore, a detailed analysis of research challenges and issues is presented. We will show that there are still shortcomings and identify important requirements for security in PAIS. We will also point out open questions related to specifying, modeling, and changing security policies which will provide a road map for future research.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121357626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Recovery of Pidgin Chat Communication Artefacts from Physical Memory: A Pilot Test to Determine Feasibility 从物理内存中恢复洋泾浜聊天通信工件:确定可行性的试点测试
Matthew Simon, J. Slay
This research describes a study that looks at the feasibility of extracting remnant information about an instant message client from physical memory. The research goal was to gather information about the target application in order to assess the viability of creating methods to recover specific data about its use. The study consists of a formal experiment where the application is used and the physical memory collected at various points. The memory image was then interrogated to assess whether remnant data could be recovered. The study shows that it is feasible to recover data about the target application.
本研究描述了一项研究,该研究着眼于从物理内存中提取有关即时消息客户机的残余信息的可行性。研究目标是收集有关目标应用程序的信息,以便评估创建方法以恢复有关其使用的特定数据的可行性。该研究包括一个正式的实验,其中使用了应用程序并在不同的点收集了物理内存。然后询问记忆图像以评估是否可以恢复残余数据。研究表明,恢复目标应用的数据是可行的。
{"title":"Recovery of Pidgin Chat Communication Artefacts from Physical Memory: A Pilot Test to Determine Feasibility","authors":"Matthew Simon, J. Slay","doi":"10.1109/ARES.2011.33","DOIUrl":"https://doi.org/10.1109/ARES.2011.33","url":null,"abstract":"This research describes a study that looks at the feasibility of extracting remnant information about an instant message client from physical memory. The research goal was to gather information about the target application in order to assess the viability of creating methods to recover specific data about its use. The study consists of a formal experiment where the application is used and the physical memory collected at various points. The memory image was then interrogated to assess whether remnant data could be recovered. The study shows that it is feasible to recover data about the target application.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121392295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Gaining Flexibility and Compliance in Rescue Processes with BPM 通过BPM获得救援流程中的灵活性和遵从性
K. Kittel, Stefan Sackmann
Weaving together information spread over several public and private organizations is crucial for managing catastrophic events and for realizing resilient social infrastructures. While beneficial in emergencies, an unlimited access to (sensitive) data is usually defined as the worst case in any privacy or IT security scenario. As a solution to this tradeoff, the transferability of successful methods and tools known from business process and workflow management to rescue processes is discussed. The resulting framework as well as the identified research questions do not aim at generating "pure" technical security but at reducing the probability of misuse and, thus, providing a sound technical basis for a social discussion on resilient infrastructures.
将分布在多个公共和私人组织的信息编织在一起,对于管理灾难性事件和实现有弹性的社会基础设施至关重要。虽然在紧急情况下是有益的,但无限制地访问(敏感)数据通常被定义为任何隐私或IT安全场景中最坏的情况。作为这种权衡的解决方案,讨论了从业务流程和工作流管理中已知的成功方法和工具到救援流程的可移植性。由此产生的框架以及确定的研究问题并不旨在产生“纯粹的”技术安全,而是旨在减少滥用的可能性,从而为关于弹性基础设施的社会讨论提供健全的技术基础。
{"title":"Gaining Flexibility and Compliance in Rescue Processes with BPM","authors":"K. Kittel, Stefan Sackmann","doi":"10.1109/ARES.2011.99","DOIUrl":"https://doi.org/10.1109/ARES.2011.99","url":null,"abstract":"Weaving together information spread over several public and private organizations is crucial for managing catastrophic events and for realizing resilient social infrastructures. While beneficial in emergencies, an unlimited access to (sensitive) data is usually defined as the worst case in any privacy or IT security scenario. As a solution to this tradeoff, the transferability of successful methods and tools known from business process and workflow management to rescue processes is discussed. The resulting framework as well as the identified research questions do not aim at generating \"pure\" technical security but at reducing the probability of misuse and, thus, providing a sound technical basis for a social discussion on resilient infrastructures.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129340768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Federated Authentication and Authorisation in the Social Science Domain 社会科学领域的联邦认证与授权
J. Watt, R. Sinnott, G. Inman, D. Chadwick
The use of Shibboleth as a mechanism for implementing federated authentication is commonplace in many countries. The ability of Shibboleth to transmit extra information about a user, including licenses, roles and other attributes, is not exploited for many reasons, mainly because institional Identity Providers (IdPs) are not maintainable sources of fine grained authorisation information. The JlSC-funded Shintau project has produced an extension to the Shibboleth profile which allows a user to link information from more than one IdP together utilising a custom Linking Service (LS). This paper describes both the application and independent evaluation of this software by the National e-Science Centre (NeSC) at the University of Glasgow within the context of the ESRC-funded Data Management through e-Social Science (DAMES) project.
在许多国家,使用Shibboleth作为实现联合身份验证的机制是很常见的。Shibboleth传输关于用户的额外信息(包括许可证、角色和其他属性)的能力没有被利用,原因有很多,主要是因为机构身份提供者(idp)不是细粒度授权信息的可维护来源。jlsc资助的Shintau项目已经产生了Shibboleth配置文件的扩展,该扩展允许用户使用自定义链接服务(LS)将来自多个IdP的信息链接在一起。本文描述了格拉斯哥大学国家电子科学中心(NeSC)在esrc资助的电子社会科学数据管理(DAMES)项目背景下对该软件的应用和独立评估。
{"title":"Federated Authentication and Authorisation in the Social Science Domain","authors":"J. Watt, R. Sinnott, G. Inman, D. Chadwick","doi":"10.1109/ARES.2011.83","DOIUrl":"https://doi.org/10.1109/ARES.2011.83","url":null,"abstract":"The use of Shibboleth as a mechanism for implementing federated authentication is commonplace in many countries. The ability of Shibboleth to transmit extra information about a user, including licenses, roles and other attributes, is not exploited for many reasons, mainly because institional Identity Providers (IdPs) are not maintainable sources of fine grained authorisation information. The JlSC-funded Shintau project has produced an extension to the Shibboleth profile which allows a user to link information from more than one IdP together utilising a custom Linking Service (LS). This paper describes both the application and independent evaluation of this software by the National e-Science Centre (NeSC) at the University of Glasgow within the context of the ESRC-funded Data Management through e-Social Science (DAMES) project.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128807482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Using CVSS in Attack Graphs 使用CVSS攻击图
L. Gallon, J. Bascou
Derived from attack models, attack graphs are providing an efficient way to model attack scenarios intended against computer networks. Such graphs are using CVE database in which all known vulnerabilities are gathered. The CVSS framework is aiming to give numeric scores to each vulnerability recorded in the CVE database, which represent its characteristics and quantify its security impacts. In this paper we adapt attack graphs definition in order to be able to use them in conjunction with CVSS framework. The aim of our work is to provide a way to give an assessment of the impact of attacks on the hosts of the target network. This assessment is made using a host damage score and a network damage score, which take into account the characteristics and consequences of each atomic attack constituting an attack scenario.
源自攻击模型的攻击图提供了一种有效的方法来模拟针对计算机网络的攻击场景。这些图形使用CVE数据库,其中收集了所有已知的漏洞。CVSS框架旨在为CVE数据库中记录的每个漏洞给出数字分数,代表其特征并量化其安全影响。在本文中,我们调整了攻击图的定义,以便能够与CVSS框架结合使用。我们工作的目的是提供一种方法来评估攻击对目标网络主机的影响。这种评估是使用主机损害评分和网络损害评分进行的,它们考虑了构成攻击场景的每种原子攻击的特征和后果。
{"title":"Using CVSS in Attack Graphs","authors":"L. Gallon, J. Bascou","doi":"10.1109/ARES.2011.18","DOIUrl":"https://doi.org/10.1109/ARES.2011.18","url":null,"abstract":"Derived from attack models, attack graphs are providing an efficient way to model attack scenarios intended against computer networks. Such graphs are using CVE database in which all known vulnerabilities are gathered. The CVSS framework is aiming to give numeric scores to each vulnerability recorded in the CVE database, which represent its characteristics and quantify its security impacts. In this paper we adapt attack graphs definition in order to be able to use them in conjunction with CVSS framework. The aim of our work is to provide a way to give an assessment of the impact of attacks on the hosts of the target network. This assessment is made using a host damage score and a network damage score, which take into account the characteristics and consequences of each atomic attack constituting an attack scenario.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116917340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Improving Resilience with Community Cloud Computing 利用社区云计算提高弹性
G. Garlick
Businesses can improve their organizational resilience by ensuring the continued existence of critical data and systems after disastrous events. Cloud computing is frequently recommended as a solution for reliable and robust systems. Community based clouds could avoid the disadvantages associated with public cloud offerings, while ensuring sufficient geographic diversity to maintain IT services at an adequate level after disasters.
企业可以通过确保关键数据和系统在灾难性事件发生后继续存在来提高其组织弹性。云计算经常被推荐为可靠和健壮的系统的解决方案。基于社区的云可以避免与公共云产品相关的缺点,同时确保足够的地理多样性,以便在灾难发生后将IT服务维持在适当的水平。
{"title":"Improving Resilience with Community Cloud Computing","authors":"G. Garlick","doi":"10.1109/ARES.2011.100","DOIUrl":"https://doi.org/10.1109/ARES.2011.100","url":null,"abstract":"Businesses can improve their organizational resilience by ensuring the continued existence of critical data and systems after disastrous events. Cloud computing is frequently recommended as a solution for reliable and robust systems. Community based clouds could avoid the disadvantages associated with public cloud offerings, while ensuring sufficient geographic diversity to maintain IT services at an adequate level after disasters.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115317590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Techniques for Automating Policy Specification for Application-oriented Access Controls 面向应用程序访问控制的策略规范自动化技术
Z. Schreuders, Christian N. Payne, T. McGill
By managing the authority assigned to each application, rule-based application-oriented access controls can significantly mitigate the threats posed by malicious code due to software vulnerabilities or malware. However, these policies are typically complex and difficult to develop. Learning modes can ease specification, however, they still require high levels of expertise to utilise correctly, and are most suited to confining non-malicious software. This paper presents a novel approach to automating policy specification for rule-based application-oriented access controls. The functionality-based application confinement (FBAC) model provides reusable parameterised abstractions. A number of straightforward yet effective techniques are presented that use these functionality-based abstractions to create application policies a priori, that is, without running programs before policies are specified. These techniques automate the specification of policy details by analysing program dependencies, program management information, and file system contents.
通过管理分配给每个应用程序的权限,基于规则的面向应用程序的访问控制可以显著减轻由软件漏洞或恶意软件引起的恶意代码所构成的威胁。然而,这些政策通常很复杂,很难制定。学习模式可以简化规范,但是,它们仍然需要高水平的专业知识才能正确使用,并且最适合于限制非恶意软件。本文提出了一种基于规则的面向应用的访问控制策略规范自动化的新方法。基于功能的应用程序限制(FBAC)模型提供可重用的参数化抽象。本文提出了许多直接而有效的技术,它们使用这些基于功能的抽象来先验地创建应用程序策略,也就是说,在指定策略之前不运行程序。这些技术通过分析程序依赖关系、程序管理信息和文件系统内容,自动化了策略细节的规范。
{"title":"Techniques for Automating Policy Specification for Application-oriented Access Controls","authors":"Z. Schreuders, Christian N. Payne, T. McGill","doi":"10.1109/ARES.2011.47","DOIUrl":"https://doi.org/10.1109/ARES.2011.47","url":null,"abstract":"By managing the authority assigned to each application, rule-based application-oriented access controls can significantly mitigate the threats posed by malicious code due to software vulnerabilities or malware. However, these policies are typically complex and difficult to develop. Learning modes can ease specification, however, they still require high levels of expertise to utilise correctly, and are most suited to confining non-malicious software. This paper presents a novel approach to automating policy specification for rule-based application-oriented access controls. The functionality-based application confinement (FBAC) model provides reusable parameterised abstractions. A number of straightforward yet effective techniques are presented that use these functionality-based abstractions to create application policies a priori, that is, without running programs before policies are specified. These techniques automate the specification of policy details by analysing program dependencies, program management information, and file system contents.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115483053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Non-Parallelizable and Non-Interactive Client Puzzles from Modular Square Roots 来自模块化平方根的非并行和非交互式客户端谜题
Yves Igor Jerschow, M. Mauve
Denial of Service (DoS) attacks aiming to exhaust the resources of a server by overwhelming it with bogus requests have become a serious threat. Especially protocols that rely on public key cryptography and perform expensive authentication handshakes may be an easy target. A well-known countermeasure against DoS attacks are client puzzles. The victimized server demands from the clients to commit computing resources before it processes their requests. To get service, a client must solve a cryptographic puzzle and submit the right solution. Existing client puzzle schemes have some drawbacks. They are either parallelizable, coarse-grained or can be used only interactively. In case of interactive client puzzles where the server poses the challenge an attacker might mount a counterattack on the clients by injecting fake packets containing bogus puzzle parameters. In this paper we introduce a novel scheme for client puzzles which relies on the computation of square roots modulo a prime. Modular square root puzzles are non-parallelizable, i.e., the solution cannot be obtained faster than scheduled by distributing the puzzle to multiple machines or CPU cores, and they can be employed both interactively and non-interactively. Our puzzles provide polynomial granularity and compact solution and verification functions. Benchmark results demonstrate the feasibility of our approach to mitigate DoS attacks on hosts in 1 or even 10 GBit networks. In addition, we show how to raise the efficiency of our puzzle scheme by introducing a bandwidth-based cost factor for the client.
拒绝服务(DoS)攻击的目的是通过大量的虚假请求来耗尽服务器的资源,这已经成为一种严重的威胁。特别是依赖于公钥加密和执行昂贵的身份验证握手的协议可能很容易成为攻击目标。针对DoS攻击的一个众所周知的对策是客户端谜题。受害服务器要求客户机在处理请求之前提交计算资源。为了获得服务,客户端必须解决一个密码谜题并提交正确的解决方案。现有的客户端谜题方案有一些缺点。它们要么是可并行的、粗粒度的,要么只能交互使用。在交互式客户端谜题的情况下,服务器提出挑战,攻击者可以通过注入包含伪造谜题参数的伪造数据包对客户端进行反击。本文介绍了一种基于平方根对素数取模计算的客户端谜题解决方案。模块化平方根谜题是不可并行的,也就是说,通过将谜题分配给多个机器或CPU内核,解决方案不能比计划更快地获得,它们可以交互或非交互地使用。我们的谜题提供多项式粒度和紧凑的解决和验证功能。基准测试结果证明了我们的方法在1 GBit甚至10 GBit网络中减轻主机DoS攻击的可行性。此外,我们还展示了如何通过为客户端引入基于带宽的成本因素来提高谜题方案的效率。
{"title":"Non-Parallelizable and Non-Interactive Client Puzzles from Modular Square Roots","authors":"Yves Igor Jerschow, M. Mauve","doi":"10.1109/ARES.2011.27","DOIUrl":"https://doi.org/10.1109/ARES.2011.27","url":null,"abstract":"Denial of Service (DoS) attacks aiming to exhaust the resources of a server by overwhelming it with bogus requests have become a serious threat. Especially protocols that rely on public key cryptography and perform expensive authentication handshakes may be an easy target. A well-known countermeasure against DoS attacks are client puzzles. The victimized server demands from the clients to commit computing resources before it processes their requests. To get service, a client must solve a cryptographic puzzle and submit the right solution. Existing client puzzle schemes have some drawbacks. They are either parallelizable, coarse-grained or can be used only interactively. In case of interactive client puzzles where the server poses the challenge an attacker might mount a counterattack on the clients by injecting fake packets containing bogus puzzle parameters. In this paper we introduce a novel scheme for client puzzles which relies on the computation of square roots modulo a prime. Modular square root puzzles are non-parallelizable, i.e., the solution cannot be obtained faster than scheduled by distributing the puzzle to multiple machines or CPU cores, and they can be employed both interactively and non-interactively. Our puzzles provide polynomial granularity and compact solution and verification functions. Benchmark results demonstrate the feasibility of our approach to mitigate DoS attacks on hosts in 1 or even 10 GBit networks. In addition, we show how to raise the efficiency of our puzzle scheme by introducing a bandwidth-based cost factor for the client.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114814700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Dynamic Responsibilities Assignment in Critical Electronic Institutions - A Context-Aware Solution for in Crisis Access Right Management 关键电子机构的动态责任分配——危机访问权限管理的情境感知解决方案
C. Bonhomme, C. Feltus, Michaël Petit
Nowadays critical IT infrastructures constitute the pillars of our economy. Being able to react quickly and in real time is a crucial challenge for the security officers in charge of maintaining those infrastructures operationally. Our state of the art in this field has highlighted that many architectures exist to dynamically support the reaction after the detection of an incident infrastructure. Those architectures are mostly elaborated based on a multi-agent system approach that offers the possibility to work in a decentralized and heterogeneous environment. However, in the meantime, we have observed that those architectures are based on a static assignment of functions to agents and that, as a consequence, isolating an agent or breaking the communication channel between two of them could create serious damage on the management of the crisis. In this paper, we propose an innovative approach for making the assignment of functions to agents in the critical architecture dynamic. Our approach exploits the concept of agent responsibility that we assign dynamically to those agents depending on the crisis type and severity. Simultaneously we explain the dynamic assignment of the access rights necessary to perform the obligation linked to these new responsibilities. This dynamic assignment of responsibilities is illustrated based on the architecture defined in the ReD project. permits to cover the entire conceptual layer from the incident detection at the very low technical layer up to the escalation of the incident to upper layer based on the decision mechanisms, our solution did not consider the normative specifications related to the responsibilities and accountability of the agents involved in it (including the technical and the human agents), and did not provide the possibility of adapting the agent responsibility during the occurrence of a crisis.
现时,重要的资讯科技基建是本港经济的支柱。对于负责维护这些基础设施运作的安全官员来说,能够快速实时地做出反应是一项重大挑战。我们在这一领域的技术水平突出表明,存在许多体系结构来动态支持检测到事件基础结构后的反应。这些体系结构大多是基于多代理系统方法进行阐述的,该方法提供了在分散和异构环境中工作的可能性。然而,与此同时,我们观察到这些架构是基于对代理的静态功能分配,因此,隔离代理或破坏其中两个代理之间的通信通道可能会对危机管理造成严重损害。在本文中,我们提出了一种创新的方法来动态地将功能分配给关键架构中的代理。我们的方法利用了代理责任的概念,我们根据危机类型和严重程度动态地分配给这些代理。同时,我们解释了执行与这些新职责相关的义务所必需的访问权的动态分配。这种动态的职责分配是基于ReD项目中定义的体系结构来说明的。许可证覆盖整个概念层和在非常低的技术层事件检测到事件升级的上层基于决策机制,我们的解决方案没有考虑相关的标准规范的责任和问责制的代理参与(包括技术和人类的代理),并没有提供适应的可能性代理责任期间发生的一场危机。
{"title":"Dynamic Responsibilities Assignment in Critical Electronic Institutions - A Context-Aware Solution for in Crisis Access Right Management","authors":"C. Bonhomme, C. Feltus, Michaël Petit","doi":"10.1109/ARES.2011.43","DOIUrl":"https://doi.org/10.1109/ARES.2011.43","url":null,"abstract":"Nowadays critical IT infrastructures constitute the pillars of our economy. Being able to react quickly and in real time is a crucial challenge for the security officers in charge of maintaining those infrastructures operationally. Our state of the art in this field has highlighted that many architectures exist to dynamically support the reaction after the detection of an incident infrastructure. Those architectures are mostly elaborated based on a multi-agent system approach that offers the possibility to work in a decentralized and heterogeneous environment. However, in the meantime, we have observed that those architectures are based on a static assignment of functions to agents and that, as a consequence, isolating an agent or breaking the communication channel between two of them could create serious damage on the management of the crisis. In this paper, we propose an innovative approach for making the assignment of functions to agents in the critical architecture dynamic. Our approach exploits the concept of agent responsibility that we assign dynamically to those agents depending on the crisis type and severity. Simultaneously we explain the dynamic assignment of the access rights necessary to perform the obligation linked to these new responsibilities. This dynamic assignment of responsibilities is illustrated based on the architecture defined in the ReD project. permits to cover the entire conceptual layer from the incident detection at the very low technical layer up to the escalation of the incident to upper layer based on the decision mechanisms, our solution did not consider the normative specifications related to the responsibilities and accountability of the agents involved in it (including the technical and the human agents), and did not provide the possibility of adapting the agent responsibility during the occurrence of a crisis.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125216511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2011 Sixth International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1