首页 > 最新文献

2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)最新文献

英文 中文
Tracing MIRAI Malware in Networked System 网络系统中MIRAI恶意软件的追踪
Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00104
Yao Xu, Hiroshi Koide, Danilo Vasconcellos Vargas, K. Sakurai
In 2021, it is anticipated that there will be approximately 30 billion Internet of Things (IoT) devices. The tremendous aggregate value of the IoT makes it a tempting and lucrative target for cyber criminals. The breakout of Mirai malware, which compromises poorly secured IoT devices with factory-default username and passphrase to launch Distributed Denial of Service (DDoS) attacks, has raised broad awareness towards the need for increased IoT security. To better defend against Mirai infection and spread, it is critical to know how the malware operates as the first step. In this paper, we give a combined static and dynamic analysis of Mirai, basing on the results of which, we introduce the application of Threat Tracer. Threat tracer is an information system simulator initially developed to help design a system robust against Advanced Persistent Attacks(APT). It offers an intuitive track on how a cyber threat behaves in a complicated networked system. The feedback simultaneously contributes to revealing vulnerabilities of a system. Our work focuses on the replication of Mirai Malware's operating processes in Threat Tracer simulation. By achieving doing so, we believe it could offer a comprehensible description of how Mirai acts. Also, considering the continuous emergence of Mirai variants, the simulation serves as a predictor on upcoming threats' behavior patterns.
到2021年,预计将有大约300亿个物联网(IoT)设备。物联网的巨大总价值使其成为网络犯罪分子诱人而有利可图的目标。Mirai恶意软件的爆发,利用出厂默认用户名和密码攻击安全性较差的物联网设备,发起分布式拒绝服务(DDoS)攻击,提高了人们对提高物联网安全性的必要性的广泛认识。为了更好地防御Mirai的感染和传播,了解恶意软件的运作方式是至关重要的第一步。本文对Mirai进行了静态和动态的综合分析,并在此基础上介绍了威胁跟踪器的应用。威胁跟踪器是一种信息系统模拟器,最初是为了帮助设计一个强大的系统来抵御高级持续攻击(APT)而开发的。它提供了一个直观的轨道,如何网络威胁的行为在一个复杂的网络系统。这些反馈同时有助于揭示系统的漏洞。我们的工作重点是在威胁跟踪器模拟中复制Mirai恶意软件的操作过程。通过这样做,我们相信它可以为Mirai的行为提供一个可理解的描述。此外,考虑到Mirai变种的不断出现,该模拟可以预测即将到来的威胁的行为模式。
{"title":"Tracing MIRAI Malware in Networked System","authors":"Yao Xu, Hiroshi Koide, Danilo Vasconcellos Vargas, K. Sakurai","doi":"10.1109/CANDARW.2018.00104","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00104","url":null,"abstract":"In 2021, it is anticipated that there will be approximately 30 billion Internet of Things (IoT) devices. The tremendous aggregate value of the IoT makes it a tempting and lucrative target for cyber criminals. The breakout of Mirai malware, which compromises poorly secured IoT devices with factory-default username and passphrase to launch Distributed Denial of Service (DDoS) attacks, has raised broad awareness towards the need for increased IoT security. To better defend against Mirai infection and spread, it is critical to know how the malware operates as the first step. In this paper, we give a combined static and dynamic analysis of Mirai, basing on the results of which, we introduce the application of Threat Tracer. Threat tracer is an information system simulator initially developed to help design a system robust against Advanced Persistent Attacks(APT). It offers an intuitive track on how a cyber threat behaves in a complicated networked system. The feedback simultaneously contributes to revealing vulnerabilities of a system. Our work focuses on the replication of Mirai Malware's operating processes in Threat Tracer simulation. By achieving doing so, we believe it could offer a comprehensible description of how Mirai acts. Also, considering the continuous emergence of Mirai variants, the simulation serves as a predictor on upcoming threats' behavior patterns.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123047361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Advanced Searchable Encryption: Keyword Search for Matrix-Type Storage 高级可搜索加密:矩阵型存储的关键字搜索
Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00061
Yuta Kodera, M. Kuribayashi, Takuya Kusaka, Y. Nogami
The recent development of IoT technologies and cloud storages, many types of information including private information have been gradually outsourced. For such a situation, new convenient functionalities such as arithmetic and keyword search on ciphertexts are required to allow users to retrieve information without leaking any information. Especially, searchable encryptions have been paid much attention to realize a keyword search on an encrypted domain. In addition, an architecture of searchable symmetric encryption (SSE) is a suitable and efficient solution for data outsourcing. In this paper, we focus on an SSE scheme which employs a secure index for searching a keyword with optimal search time. In the conventional studies, it has been widely considered that the scheme searches whether a queried keyword is contained in encrypted documents. On the other hand, we additionally take into account the location of a queried keyword in documents by targeting a matrix-type data format. It enables a manager to search personal information listed per line or column in CSV-like format data.
随着近年来物联网技术和云存储的发展,包括私人信息在内的许多类型的信息已经逐渐外包。在这种情况下,需要新的便利功能,如对密文的算术和关键字搜索,以允许用户在不泄露任何信息的情况下检索信息。特别是可搜索加密技术在加密域上实现关键字搜索,受到了广泛的关注。此外,可搜索对称加密(SSE)体系结构是一种适用于数据外包的高效解决方案。本文研究了一种SSE方案,该方案采用安全索引来搜索具有最优搜索时间的关键字。在传统的研究中,人们普遍认为该方案搜索被查询的关键字是否包含在加密文档中。另一方面,通过以矩阵类型的数据格式为目标,我们还要考虑查询关键字在文档中的位置。它使管理人员能够搜索类似csv格式数据中每行或每列列出的个人信息。
{"title":"Advanced Searchable Encryption: Keyword Search for Matrix-Type Storage","authors":"Yuta Kodera, M. Kuribayashi, Takuya Kusaka, Y. Nogami","doi":"10.1109/CANDARW.2018.00061","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00061","url":null,"abstract":"The recent development of IoT technologies and cloud storages, many types of information including private information have been gradually outsourced. For such a situation, new convenient functionalities such as arithmetic and keyword search on ciphertexts are required to allow users to retrieve information without leaking any information. Especially, searchable encryptions have been paid much attention to realize a keyword search on an encrypted domain. In addition, an architecture of searchable symmetric encryption (SSE) is a suitable and efficient solution for data outsourcing. In this paper, we focus on an SSE scheme which employs a secure index for searching a keyword with optimal search time. In the conventional studies, it has been widely considered that the scheme searches whether a queried keyword is contained in encrypted documents. On the other hand, we additionally take into account the location of a queried keyword in documents by targeting a matrix-type data format. It enables a manager to search personal information listed per line or column in CSV-like format data.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117120436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatial Feature Aware Genetic Algorithm of Network Base Station Configuration for Internet of Things 面向物联网的网络基站配置空间特征感知遗传算法
Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00018
Haobin Wang, W. Huangfu, Yaxi Liu, Cheng Gong, Yebing Ren, W. Liu
Network configurations, which maximize the accessed number of the sensor devices in IoT subjected to limited active base stations is an important topic. The weakness of traditional genetic algorithms mainly lies in that the spatial feature, i.e., the geometry distribution of base stations, is not considered. A novel genetic algorithm, in which the spatial feature of base stations is taken into account, to obtain the optimal subset of base stations in IoT is proposed. The crossover operation and the mutation operation are designated based on the spatial characteristic. Experiments have been conducted to prove the proposed algorithm for the network configuration.
如何在有限的有源基站条件下使物联网中传感器设备的接入数量最大化,是一个重要的网络配置问题。传统遗传算法的弱点主要在于没有考虑基站的空间特征,即基站的几何分布。提出了一种考虑基站空间特征的遗传算法,以获得物联网中最优基站子集。根据空间特征指定交叉操作和突变操作。实验证明了该算法在网络配置中的有效性。
{"title":"Spatial Feature Aware Genetic Algorithm of Network Base Station Configuration for Internet of Things","authors":"Haobin Wang, W. Huangfu, Yaxi Liu, Cheng Gong, Yebing Ren, W. Liu","doi":"10.1109/CANDARW.2018.00018","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00018","url":null,"abstract":"Network configurations, which maximize the accessed number of the sensor devices in IoT subjected to limited active base stations is an important topic. The weakness of traditional genetic algorithms mainly lies in that the spatial feature, i.e., the geometry distribution of base stations, is not considered. A novel genetic algorithm, in which the spatial feature of base stations is taken into account, to obtain the optimal subset of base stations in IoT is proposed. The crossover operation and the mutation operation are designated based on the spatial characteristic. Experiments have been conducted to prove the proposed algorithm for the network configuration.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116164972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Improving Data Transfer Efficiency for Accelerators Using Hardware Compression 利用硬件压缩提高加速器数据传输效率的研究
Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00031
Max Plauth, A. Polze
The overhead of moving data is the major limiting factor in todays hardware, especially in heterogeneous systems where data needs to be transferred frequently between host and accelerator memory. With the increasing availability of hardware-based compression facilities in modern computer architectures, this paper investigates the potential of hardware-accelerated I/O Link Compression as a promising approach to reduce data volumes and transfer time, thus improving the overall efficiency of accelerators in heterogeneous systems. Our considerations are focused on On-the-Fly compression in both Single-Node and Scale-Out deployments. Based on a theoretical analysis, this paper demonstrates the feasibility of hardware-accelerated On-the-Fly I/O Link Compression for many workloads in a Scale-Out scenario, and for some even in a Single-Node scenario. These findings are confirmed in a preliminary evaluation using software-and hardware-based implementations of the 842 compression algorithm.
移动数据的开销是当今硬件的主要限制因素,特别是在需要在主机和加速器内存之间频繁传输数据的异构系统中。随着现代计算机体系结构中基于硬件的压缩设施的可用性越来越高,本文研究了硬件加速I/O链路压缩的潜力,作为一种有前途的方法来减少数据量和传输时间,从而提高异构系统中加速器的整体效率。我们关注的是单节点和横向扩展部署中的动态压缩。在理论分析的基础上,本文论证了硬件加速实时I/O链路压缩在Scale-Out场景下的许多工作负载,甚至在单节点场景下的可行性。这些发现在使用基于软件和硬件的842压缩算法实现的初步评估中得到了证实。
{"title":"Towards Improving Data Transfer Efficiency for Accelerators Using Hardware Compression","authors":"Max Plauth, A. Polze","doi":"10.1109/CANDARW.2018.00031","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00031","url":null,"abstract":"The overhead of moving data is the major limiting factor in todays hardware, especially in heterogeneous systems where data needs to be transferred frequently between host and accelerator memory. With the increasing availability of hardware-based compression facilities in modern computer architectures, this paper investigates the potential of hardware-accelerated I/O Link Compression as a promising approach to reduce data volumes and transfer time, thus improving the overall efficiency of accelerators in heterogeneous systems. Our considerations are focused on On-the-Fly compression in both Single-Node and Scale-Out deployments. Based on a theoretical analysis, this paper demonstrates the feasibility of hardware-accelerated On-the-Fly I/O Link Compression for many workloads in a Scale-Out scenario, and for some even in a Single-Node scenario. These findings are confirmed in a preliminary evaluation using software-and hardware-based implementations of the 842 compression algorithm.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"55 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114125465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive Artificial Bee Colony for Numerical Optimization 自适应人工蜂群数值优化
Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00040
Sheng-Ta Hsieh, Chun-Ling Lin, Hao-Wen Cheng
Artificial bee colony (ABC) is a population-based optimizer. It simulates bees' social behavior for searching better solutions in solution space. Either too large or too small colony size will influence ABC's solution searching performance directly. In order to deal with the problem, in this paper, an adaptive colony is proposed. The adaptive colony will join potential bees or eliminate redundant bees, according solution searching situation. In experiments, 10 test functions of CEC 2015 are adopted for testing proposed method and compare it with three ABC variants. From the results, it can be observed that the proposed method performs better than other three related works.
人工蜂群(ABC)是一种基于种群的优化算法。它模拟蜜蜂在解决方案空间中寻找更好解决方案的社会行为。蚁群大小过大或过小都会直接影响ABC算法的寻解性能。为了解决这一问题,本文提出了一种自适应蚁群算法。根据解的搜索情况,适应蜂群将加入潜在的蜜蜂或淘汰多余的蜜蜂。在实验中,采用CEC 2015的10个测试函数对所提出的方法进行测试,并与三种ABC变体进行比较。从结果可以看出,该方法的性能优于其他三种相关方法。
{"title":"Adaptive Artificial Bee Colony for Numerical Optimization","authors":"Sheng-Ta Hsieh, Chun-Ling Lin, Hao-Wen Cheng","doi":"10.1109/CANDARW.2018.00040","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00040","url":null,"abstract":"Artificial bee colony (ABC) is a population-based optimizer. It simulates bees' social behavior for searching better solutions in solution space. Either too large or too small colony size will influence ABC's solution searching performance directly. In order to deal with the problem, in this paper, an adaptive colony is proposed. The adaptive colony will join potential bees or eliminate redundant bees, according solution searching situation. In experiments, 10 test functions of CEC 2015 are adopted for testing proposed method and compare it with three ABC variants. From the results, it can be observed that the proposed method performs better than other three related works.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128721155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of EMVA Using the Instruction-Level Parallelism on Tegra X1 在Tegra X1上使用指令级并行性评估EMVA
Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00052
H. Tominaga, Asuka Nakamura, Y. Maekawa
Generally, solving random-sparse equations requires a direct method such as the LU decomposition. This paper proposes a speed-up method based on the extended vectorized LU factorization (EMVA) method for solving random-sparse equations using the instruction-level parallelism of the CUDA GPU. It is known that EMVA on CUDA achieves high execution efficiency [1]. However, the overhead of calling the kernel of EMVA is not small because the EMVA method needs to call a new kernel each time the instruction level increases. This overhead becomes smaller when using an architecture that can switch smoothly between the CPU and GPU kernels, such as the Tegra X1 architectures. Therefore, the proposed method selects the execution architecture of each instruction level from CPU to GPU on the basis of the parallelism of its instruction level. Our evaluation result demonstrate that the proposed method achieves about x26.5 speedup compared to the existing EMVA method.
一般来说,求解随机稀疏方程需要一种直接的方法,如LU分解。本文利用CUDA GPU的指令级并行性,提出了一种基于扩展矢量化LU分解(EMVA)方法求解随机稀疏方程的加速方法。众所周知,EMVA在CUDA上的执行效率很高[1]。然而,调用EMVA内核的开销并不小,因为每次指令级别增加时,EMVA方法都需要调用一个新的内核。当使用可以在CPU和GPU内核之间平滑切换的体系结构(例如Tegra X1体系结构)时,这种开销会变得更小。因此,该方法根据各指令层的并行性,从CPU到GPU选择各指令层的执行架构。我们的评估结果表明,与现有的EMVA方法相比,该方法的加速速度提高了约x26.5。
{"title":"Evaluation of EMVA Using the Instruction-Level Parallelism on Tegra X1","authors":"H. Tominaga, Asuka Nakamura, Y. Maekawa","doi":"10.1109/CANDARW.2018.00052","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00052","url":null,"abstract":"Generally, solving random-sparse equations requires a direct method such as the LU decomposition. This paper proposes a speed-up method based on the extended vectorized LU factorization (EMVA) method for solving random-sparse equations using the instruction-level parallelism of the CUDA GPU. It is known that EMVA on CUDA achieves high execution efficiency [1]. However, the overhead of calling the kernel of EMVA is not small because the EMVA method needs to call a new kernel each time the instruction level increases. This overhead becomes smaller when using an architecture that can switch smoothly between the CPU and GPU kernels, such as the Tegra X1 architectures. Therefore, the proposed method selects the execution architecture of each instruction level from CPU to GPU on the basis of the parallelism of its instruction level. Our evaluation result demonstrate that the proposed method achieves about x26.5 speedup compared to the existing EMVA method.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124751524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Load Balancing Method for IoT Sensor System Using Multi-access Edge Computing 基于多址边缘计算的物联网传感器系统负载均衡方法
Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00023
Ryuta Mogi, T. Nakayama, T. Asaka
In recent years, small terminals such as smartphones equipped with various sensor functions have become widespread, and studies on wireless sensor networks and edge computing are advancing from the use of the latest technology such as Internet of Things (IoT) and intelligent transport systems. However, there are still many problems such as cooperation between edges and clouds, off-load, and how to realize orchestration. In addition, research on offloading when load conditions dynamically fluctuate and load balancing among edge servers has not been investigated. In this paper, we propose a load balancing method for an IoT sensor system using multi-access edge computing to equalize the load of edge servers when events such as a traffic congestion and guerrilla rainstorms occur.
近年来,配备各种传感器功能的智能手机等小型终端已经普及,无线传感器网络和边缘计算的研究正在从物联网(IoT)和智能交通系统等最新技术的使用中推进。但是,边缘与云之间的协作、卸载、如何实现编排等问题仍然存在。此外,对负载情况动态波动时的卸载和边缘服务器之间的负载均衡问题也没有进行研究。在本文中,我们提出了一种物联网传感器系统的负载平衡方法,该方法使用多访问边缘计算来平衡边缘服务器的负载,当发生交通拥堵和游击暴雨等事件时。
{"title":"Load Balancing Method for IoT Sensor System Using Multi-access Edge Computing","authors":"Ryuta Mogi, T. Nakayama, T. Asaka","doi":"10.1109/CANDARW.2018.00023","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00023","url":null,"abstract":"In recent years, small terminals such as smartphones equipped with various sensor functions have become widespread, and studies on wireless sensor networks and edge computing are advancing from the use of the latest technology such as Internet of Things (IoT) and intelligent transport systems. However, there are still many problems such as cooperation between edges and clouds, off-load, and how to realize orchestration. In addition, research on offloading when load conditions dynamically fluctuate and load balancing among edge servers has not been investigated. In this paper, we propose a load balancing method for an IoT sensor system using multi-access edge computing to equalize the load of edge servers when events such as a traffic congestion and guerrilla rainstorms occur.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129171004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A Network-Based Event Detection Module Using NTP for Cyber Attacks on IoT 基于网络的NTP事件检测模块用于物联网网络攻击
Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00025
Tamotsu Kawamura, Masaru Fukushi, Yasushi Hirano, Y. Fujita, Y. Hamamoto
Developing countermeasures against cyber attacks is an urgent issue in Internet of Things (IoT) environment, and event detection is becoming increasingly important to detect events as the presages of a security incident. This paper proposes an event detection module which can be embedded into IoT devices. The proposed module focuses on the system behavior under cyber attacks and detects events utilizing information from Network Time Protocol (NTP) commonly used in network time synchronization service. This module works under a wireless access point (AP) and detects events on IoT devices linked to the AP. Different from the existing modules, it does not require any additional appliances nor periodic maintenance involving technical knowledges. We conducted demonstration experiments with the developed module generating pseudo cyber attacks. The result shows that the proposed module achieves high recall and precision values, indicating its usefulness in the real time event detection on IoT.
在物联网环境下,制定应对网络攻击的对策是一个紧迫的问题,而事件检测对于检测作为安全事件前兆的事件变得越来越重要。本文提出了一种可嵌入物联网设备的事件检测模块。该模块关注系统在网络攻击下的行为,利用网络时间同步服务中常用的网络时间协议(NTP)信息检测事件。该模块在无线接入点(AP)下工作,检测与AP相连的物联网设备上的事件。与现有模块不同,它不需要任何额外的设备,也不需要涉及技术知识的定期维护。我们使用开发的模块进行了演示实验,生成伪网络攻击。结果表明,该模块在物联网实时事件检测中具有较高的查全率和查准率。
{"title":"A Network-Based Event Detection Module Using NTP for Cyber Attacks on IoT","authors":"Tamotsu Kawamura, Masaru Fukushi, Yasushi Hirano, Y. Fujita, Y. Hamamoto","doi":"10.1109/CANDARW.2018.00025","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00025","url":null,"abstract":"Developing countermeasures against cyber attacks is an urgent issue in Internet of Things (IoT) environment, and event detection is becoming increasingly important to detect events as the presages of a security incident. This paper proposes an event detection module which can be embedded into IoT devices. The proposed module focuses on the system behavior under cyber attacks and detects events utilizing information from Network Time Protocol (NTP) commonly used in network time synchronization service. This module works under a wireless access point (AP) and detects events on IoT devices linked to the AP. Different from the existing modules, it does not require any additional appliances nor periodic maintenance involving technical knowledges. We conducted demonstration experiments with the developed module generating pseudo cyber attacks. The result shows that the proposed module achieves high recall and precision values, indicating its usefulness in the real time event detection on IoT.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121730111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Consideration of Efficient Pairing Applying Two Construction Methods of Extension Fields 应用两种可拓域构造方法的有效配对思考
Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00087
Yuki Nanjo, Md. Al-Amin Khandaker, Takuya Kusaka, Y. Nogami
In recent years, many innovative cryptography protocols based on the pairing. Finding out an efficient extension field construction is one of the prerequisites for a practical pairing implementation. The author tries to find an elegant extension field construction which will result in efficient pairing over Barreto-Naehrig (BN) curve. In this paper, two construction methods are considered for extension field of degree 12, and one of them results in an efficient exponentiation and the other enables to compute faster Miller loop than the former one. Therefore, a method which uses a basis conversion matrix between the two extension field is proposed. In comparison to the performance of Aranha et al.'s towering, the proposed implementation results in the efficient exponentiation in a multiplicative group, although pairing cost is slightly increased.
近年来,许多创新的加密协议都是基于配对的。寻找一种有效的可拓域构造方法是实际实现配对的前提之一。作者试图找到一种能在Barreto-Naehrig (BN)曲线上实现有效配对的优雅的可拓域构造。本文考虑了12次可拓域的两种构造方法,其中一种方法能有效地求幂,另一种方法能比前一种方法更快地计算米勒环。为此,提出了在两个扩展域之间使用基转换矩阵的方法。与Aranha等人的高耸算法的性能相比,尽管配对成本略有增加,但所提出的实现在乘法组中实现了有效的幂运算。
{"title":"Consideration of Efficient Pairing Applying Two Construction Methods of Extension Fields","authors":"Yuki Nanjo, Md. Al-Amin Khandaker, Takuya Kusaka, Y. Nogami","doi":"10.1109/CANDARW.2018.00087","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00087","url":null,"abstract":"In recent years, many innovative cryptography protocols based on the pairing. Finding out an efficient extension field construction is one of the prerequisites for a practical pairing implementation. The author tries to find an elegant extension field construction which will result in efficient pairing over Barreto-Naehrig (BN) curve. In this paper, two construction methods are considered for extension field of degree 12, and one of them results in an efficient exponentiation and the other enables to compute faster Miller loop than the former one. Therefore, a method which uses a basis conversion matrix between the two extension field is proposed. In comparison to the performance of Aranha et al.'s towering, the proposed implementation results in the efficient exponentiation in a multiplicative group, although pairing cost is slightly increased.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131505568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementations of Droplets in Managed Network Blocks 管理网络块中液滴的实现
Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00076
Ryusei Saka, M. Uehara
In recent years, the use of cloud computing has become more widespread, as has the use of edge computing through distributed systems such as the Internet of Things. Instead of processing everything in the cloud, it is necessary to process information in distributed nodes. We propose the idea of managed network blocks (MNBs) in this paper, which have three features. First, MNBs provide cloud-managed network services to small networks such as home networks. Second, MNBs realizes network address translation traversal because it is based on mist architecture which consists of three components: clouds, mist (so-called cloudlets) and droplets. Mist and droplets are usually located in private local-area networks. Finally, MNBs support reconfigurable devices named droplets. In this paper, we describe the functions of droplets and how to implement them.
近年来,云计算的使用变得越来越广泛,通过物联网等分布式系统使用边缘计算也是如此。与在云中处理所有信息不同,有必要在分布式节点中处理信息。本文提出了托管网络块(mnb)的思想,它具有三个特点。首先,移动电话运营商为家庭网络等小型网络提供云管理的网络服务。其次,MNBs实现了网络地址转换遍历,因为它是基于雾架构的,雾架构由云、雾(所谓的cloudlets)和水滴三部分组成。雾和液滴通常位于私有局域网中。最后,mnb支持名为液滴的可重构设备。在本文中,我们描述了液滴的功能及其实现方法。
{"title":"Implementations of Droplets in Managed Network Blocks","authors":"Ryusei Saka, M. Uehara","doi":"10.1109/CANDARW.2018.00076","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00076","url":null,"abstract":"In recent years, the use of cloud computing has become more widespread, as has the use of edge computing through distributed systems such as the Internet of Things. Instead of processing everything in the cloud, it is necessary to process information in distributed nodes. We propose the idea of managed network blocks (MNBs) in this paper, which have three features. First, MNBs provide cloud-managed network services to small networks such as home networks. Second, MNBs realizes network address translation traversal because it is based on mist architecture which consists of three components: clouds, mist (so-called cloudlets) and droplets. Mist and droplets are usually located in private local-area networks. Finally, MNBs support reconfigurable devices named droplets. In this paper, we describe the functions of droplets and how to implement them.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117336179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1