首页 > 最新文献

2015 10th International Conference on Availability, Reliability and Security最新文献

英文 中文
Trust me, I'm a Root CA! Analyzing SSL Root CAs in Modern Browsers and Operating Systems 相信我,我是根CA!现代浏览器和操作系统中的SSL根ca分析
T. Fadai, S. Schrittwieser, Peter Kieseberg, M. Mulazzani
The security and privacy of our online communications heavily relies on the entity authentication mechanisms provided by SSL. Those mechanisms in turn heavily depend on the trustworthiness of a large number of companies and governmental institutions for attestation of the identity of SSL services providers. In order to offer a wide and unobstructed availability of SSL-enabled services and to remove the need to make a large amount of trust decisions from their users, operating systems and browser manufactures include lists of certification authorities which are trusted for SSL entity authentication by their products. This has the problematic effect that users of such browsers and operating systems implicitly trust those certification authorities with the privacy of their communications while they might not even realize it. The problem is further complicated by the fact that different software vendors trust different companies and governmental institutions, from a variety of countries, which leads to an obscure distribution of trust. To give insight into the trust model used by SSL this thesis explains the various entities and technical processes involved in establishing trust when using SSL communications. It furthermore analyzes the number and origin of companies and governmental institutions trusted by various operating systems and browser vendors and correlates the gathered information to a variety of indexes to illustrate that some of these trusted entities are far from trustworthy. Furthermore it points out the fact that the number of entities we trust with the security of our SSL communications keeps growing over time and displays the negative effects this might have as well as shows that the trust model of SSL is fundamentally broken.
我们在线通信的安全性和隐私性在很大程度上依赖于SSL提供的实体身份验证机制。这些机制反过来在很大程度上依赖于大量公司和政府机构对SSL服务提供者身份的认证的可信度。为了提供支持SSL的服务的广泛和畅通的可用性,并消除对用户进行大量信任决策的需要,操作系统和浏览器制造商包括其产品对SSL实体身份验证受信任的证书颁发机构列表。这就产生了一个问题,即这些浏览器和操作系统的用户隐式地信任这些证书颁发机构,将其通信的隐私保护起来,而他们甚至可能没有意识到这一点。由于不同的软件供应商信任来自不同国家的不同公司和政府机构,这导致了信任的模糊分布,这一事实使问题进一步复杂化。为了深入了解SSL使用的信任模型,本文解释了在使用SSL通信时建立信任所涉及的各种实体和技术过程。它进一步分析了受各种操作系统和浏览器供应商信任的公司和政府机构的数量和来源,并将收集到的信息与各种索引相关联,以说明其中一些受信任的实体远不值得信任。此外,它还指出了一个事实,即我们信任SSL通信安全性的实体数量随着时间的推移而不断增长,并显示了这可能产生的负面影响,同时也表明了SSL的信任模型从根本上被破坏了。
{"title":"Trust me, I'm a Root CA! Analyzing SSL Root CAs in Modern Browsers and Operating Systems","authors":"T. Fadai, S. Schrittwieser, Peter Kieseberg, M. Mulazzani","doi":"10.1109/ARES.2015.93","DOIUrl":"https://doi.org/10.1109/ARES.2015.93","url":null,"abstract":"The security and privacy of our online communications heavily relies on the entity authentication mechanisms provided by SSL. Those mechanisms in turn heavily depend on the trustworthiness of a large number of companies and governmental institutions for attestation of the identity of SSL services providers. In order to offer a wide and unobstructed availability of SSL-enabled services and to remove the need to make a large amount of trust decisions from their users, operating systems and browser manufactures include lists of certification authorities which are trusted for SSL entity authentication by their products. This has the problematic effect that users of such browsers and operating systems implicitly trust those certification authorities with the privacy of their communications while they might not even realize it. The problem is further complicated by the fact that different software vendors trust different companies and governmental institutions, from a variety of countries, which leads to an obscure distribution of trust. To give insight into the trust model used by SSL this thesis explains the various entities and technical processes involved in establishing trust when using SSL communications. It furthermore analyzes the number and origin of companies and governmental institutions trusted by various operating systems and browser vendors and correlates the gathered information to a variety of indexes to illustrate that some of these trusted entities are far from trustworthy. Furthermore it points out the fact that the number of entities we trust with the security of our SSL communications keeps growing over time and displays the negative effects this might have as well as shows that the trust model of SSL is fundamentally broken.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115664567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Risk Assessment of Public Safety and Security Mobile Service 公共安全风险评估及保安流动服务
Matti J. Peltola, P. Kekolahti
A deeper understanding of the availability of Public Safety and Security (PSS) mobile networks and their service under different conditions offers decision makers guidelines on the level of investments required and the directions to take in order to decrease the risks identified. In the study, a risk assessment model for the existing PSS mobile service is implemented for both a dedicated TETRA PSS mobile network as well as for a commercial 2G/3G mobile network operating under the current risk conditions. The probabilistic risk assessment is carried out by constructing a Bayesian Network. According to the analysis, the availability of the dedicated Finnish PSS mobile service is 99.1%. Based on the risk assessment and sensitivity analysis conducted, the most effective elements for decreasing availability risks would be duplication of the transmission links, backup of the power supply and real-time mobile traffic monitoring. With the adjustment of these key control variables, the service availability can be improved up to the level of 99.9%. The investments needed to improve the availability of the PSS mobile service from 99.1 % to 99.9% are profitable only in highly populated areas. The calculated availability of the PSS mobile service based on a purely commercial network is 98.8%. The adoption of a Bayesian Network as a risk assessment method is demonstrated to be a useful way of documenting different expert knowledge as a common belief about the risks, their magnitudes and their effects upon a Finnish PSS mobile service.
更深入地了解公共安全和安保(PSS)移动网络的可用性及其在不同条件下的服务,为决策者提供了所需投资水平的指导方针和采取的方向,以减少已确定的风险。在这项研究中,现有的PSS流动服务的风险评估模型分别适用于专用的TETRA PSS流动网络,以及在当前风险条件下运行的商用2G/3G流动网络。通过构建贝叶斯网络进行概率风险评估。根据分析,芬兰专用PSS移动服务的可用性为99.1%。根据所进行的风险评估和敏感性分析,降低可用性风险的最有效因素是传输链路的重复、电源的备份和实时移动交通监控。通过对这些关键控制变量的调整,可将服务的可用性提高到99.9%的水平。将PSS移动服务的可用性从99.1%提高到99.9%所需的投资只有在人口密集的地区才有利可图。基于纯商用网络的PSS移动业务的计算可用性为98.8%。采用贝叶斯网络作为风险评估方法被证明是一种有用的方法,可以记录不同的专家知识,作为对芬兰PSS移动服务的风险,其大小及其影响的共同信念。
{"title":"Risk Assessment of Public Safety and Security Mobile Service","authors":"Matti J. Peltola, P. Kekolahti","doi":"10.1109/ARES.2015.65","DOIUrl":"https://doi.org/10.1109/ARES.2015.65","url":null,"abstract":"A deeper understanding of the availability of Public Safety and Security (PSS) mobile networks and their service under different conditions offers decision makers guidelines on the level of investments required and the directions to take in order to decrease the risks identified. In the study, a risk assessment model for the existing PSS mobile service is implemented for both a dedicated TETRA PSS mobile network as well as for a commercial 2G/3G mobile network operating under the current risk conditions. The probabilistic risk assessment is carried out by constructing a Bayesian Network. According to the analysis, the availability of the dedicated Finnish PSS mobile service is 99.1%. Based on the risk assessment and sensitivity analysis conducted, the most effective elements for decreasing availability risks would be duplication of the transmission links, backup of the power supply and real-time mobile traffic monitoring. With the adjustment of these key control variables, the service availability can be improved up to the level of 99.9%. The investments needed to improve the availability of the PSS mobile service from 99.1 % to 99.9% are profitable only in highly populated areas. The calculated availability of the PSS mobile service based on a purely commercial network is 98.8%. The adoption of a Bayesian Network as a risk assessment method is demonstrated to be a useful way of documenting different expert knowledge as a common belief about the risks, their magnitudes and their effects upon a Finnish PSS mobile service.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122117759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Effects of Cultural Dimensions on the Development of an ISMS Based on the ISO 27001 文化维度对基于ISO 27001的ISMS发展的影响
B. Shojaie, H. Federrath, I. Saberi
The ISO 27001 is the most adopted international information security management standard, by several countries and industries. This paper looks closely to the impacts of cultural characteristics on different phases of developing ISO 27001, based on three levels (country, organisational, and personal), which is especially helpful for Small and Medium Enterprises (SMEs). Cultural dimensions can significantly affect organisational administration and achievements such as decision-making, innovation and new practices, work motivation, negotiation, human resource practices, and leadership. The results are mainly based on a literature review, such as Hofstede and their relationship with the ISO 27001 Annex A. The outcomes of this paper illustrate that national (country level) cultural dimensions have high impact on the success and effectiveness of the ISO 27001 development phases.
ISO 27001是多个国家和行业采用最多的国际信息安全管理标准。本文从三个层面(国家、组织和个人)密切关注文化特征对制定ISO 27001不同阶段的影响,这对中小企业(SMEs)特别有帮助。文化维度可以显著影响组织管理和成就,如决策、创新和新实践、工作动机、谈判、人力资源实践和领导力。结果主要基于文献综述,如Hofstede及其与ISO 27001附件a的关系。本文的结果表明,国家(国家层面)文化维度对ISO 27001开发阶段的成功和有效性有很大影响。
{"title":"The Effects of Cultural Dimensions on the Development of an ISMS Based on the ISO 27001","authors":"B. Shojaie, H. Federrath, I. Saberi","doi":"10.1109/ARES.2015.25","DOIUrl":"https://doi.org/10.1109/ARES.2015.25","url":null,"abstract":"The ISO 27001 is the most adopted international information security management standard, by several countries and industries. This paper looks closely to the impacts of cultural characteristics on different phases of developing ISO 27001, based on three levels (country, organisational, and personal), which is especially helpful for Small and Medium Enterprises (SMEs). Cultural dimensions can significantly affect organisational administration and achievements such as decision-making, innovation and new practices, work motivation, negotiation, human resource practices, and leadership. The results are mainly based on a literature review, such as Hofstede and their relationship with the ISO 27001 Annex A. The outcomes of this paper illustrate that national (country level) cultural dimensions have high impact on the success and effectiveness of the ISO 27001 development phases.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116810867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Personal Agent for Services in ITS ITS服务的个人代理
S. Kiyomoto, Toru Nakamura, Haruo Takasaki, Tatsuhiko Hirabayashi
In this paper, we introduce the concept of a privacy enhancing personal agent that manages a user's privacy policy settings and provides access control functions to ITS services. The personal agent acts as a proxy between a vehicle and service providers, and it automatically decides whether personal data can be sent to a service provider based on the privacy policy settings. The functions of the personal agent are also described. The personal agent provides a common web-based interface, and the quality of data can be controlled through anonymization levels. Our research provides a conceptual model of the personal agent and considers the design of the personal agent based on privacy requirements. Drivers can delegate their user consent role to the personal agent by configuring privacy policy settings on the personal agent. The personal agent is a key component for achieving a secure and reliable data transfer platform between vehicles and service providers.
在本文中,我们引入了隐私增强个人代理的概念,该代理管理用户的隐私策略设置并为ITS服务提供访问控制功能。个人代理充当车辆和服务提供商之间的代理,它根据隐私策略设置自动决定是否可以将个人数据发送给服务提供商。对个人代理的功能进行了描述。个人代理提供了一个基于web的通用接口,并且可以通过匿名化级别控制数据的质量。我们的研究提供了个人代理的概念模型,并考虑了基于隐私需求的个人代理设计。驾驶员可以通过在个人代理上配置隐私策略设置,将其用户同意角色委托给个人代理。个人代理是实现车辆和服务提供商之间安全可靠的数据传输平台的关键组成部分。
{"title":"Personal Agent for Services in ITS","authors":"S. Kiyomoto, Toru Nakamura, Haruo Takasaki, Tatsuhiko Hirabayashi","doi":"10.1109/ARES.2015.16","DOIUrl":"https://doi.org/10.1109/ARES.2015.16","url":null,"abstract":"In this paper, we introduce the concept of a privacy enhancing personal agent that manages a user's privacy policy settings and provides access control functions to ITS services. The personal agent acts as a proxy between a vehicle and service providers, and it automatically decides whether personal data can be sent to a service provider based on the privacy policy settings. The functions of the personal agent are also described. The personal agent provides a common web-based interface, and the quality of data can be controlled through anonymization levels. Our research provides a conceptual model of the personal agent and considers the design of the personal agent based on privacy requirements. Drivers can delegate their user consent role to the personal agent by configuring privacy policy settings on the personal agent. The personal agent is a key component for achieving a secure and reliable data transfer platform between vehicles and service providers.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129829551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting 董事会投票加密协议的效率评估
O. Kulyk, Stephan Neumann, Jurlind Budurushi, M. Volkamer, R. Haenni, Reto E. Koenig, Philémon von Bergen
Efficiency is the bottleneck of many cryptographic protocols towards their practical application in different contexts. This holds true also in the context of electronic voting, where cryptographic protocols are used to ensure a diversity of security requirements, e.g. Secrecy and integrity of cast votes. A new and promising application area of electronic voting is boardroom voting, which in practice takes place very frequently and often on simple issues such as approving or refusing a budget. Hence, it is not a surprise that a number of cryptographic protocols for boardroom voting have been already proposed. In this work, we introduce a security model adequate for the boardroom voting context. Further, we evaluate the efficiency of four boardroom voting protocols, which to best of our knowledge are the only boardroom voting protocols that satisfy our security model. Finally, we compare the performance of these protocols in different election settings.
效率是制约许多加密协议在不同环境下实际应用的瓶颈。在电子投票的背景下也是如此,其中使用加密协议来确保各种安全要求,例如投票的保密性和完整性。电子投票的一个新的和有前途的应用领域是董事会投票,它在实践中经常发生,通常是在批准或拒绝预算等简单问题上。因此,已经提出了许多用于董事会投票的加密协议也就不足为奇了。在这项工作中,我们引入了一个适合董事会投票环境的安全模型。此外,我们评估了四个董事会投票协议的效率,据我们所知,这是唯一满足我们的安全模型的董事会投票协议。最后,我们比较了这些协议在不同选举设置下的性能。
{"title":"Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting","authors":"O. Kulyk, Stephan Neumann, Jurlind Budurushi, M. Volkamer, R. Haenni, Reto E. Koenig, Philémon von Bergen","doi":"10.1109/ARES.2015.75","DOIUrl":"https://doi.org/10.1109/ARES.2015.75","url":null,"abstract":"Efficiency is the bottleneck of many cryptographic protocols towards their practical application in different contexts. This holds true also in the context of electronic voting, where cryptographic protocols are used to ensure a diversity of security requirements, e.g. Secrecy and integrity of cast votes. A new and promising application area of electronic voting is boardroom voting, which in practice takes place very frequently and often on simple issues such as approving or refusing a budget. Hence, it is not a surprise that a number of cryptographic protocols for boardroom voting have been already proposed. In this work, we introduce a security model adequate for the boardroom voting context. Further, we evaluate the efficiency of four boardroom voting protocols, which to best of our knowledge are the only boardroom voting protocols that satisfy our security model. Finally, we compare the performance of these protocols in different election settings.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131696871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Impacts of Tourist Accommodations as Temporal Shelter on Evacuee Overflow for the Reassignment of Shelters Jurisdiction 旅游住宿作为临时避难所对避难所管辖权重新分配的疏散人员溢出的影响
Yu Ichifuji, N. Koide, N. Sonehara
Effective measures against natural disasters are needed worldwide, and the jurisdiction assignment of evacuation shelters during natural disasters is one such measure. In this paper, we discuss two evacuation cases involving tourist accommodations as temporary shelters. One involves evacuation to the closest shelter, and the other involves using our previously proposed optimization method for assigning jurisdiction for shelters. The impact of tourist accommodations on evacuee overflow for each case was investigated. We also explain that tourist accommodations as temporary shelter reduce the evacuee overflow at shelters by using a numerical example. We argue that its impact is limited by giving an example of a city in Japan where the evacuation and residential areas are widely spaced.
世界各国都需要采取有效的措施来应对自然灾害,自然灾害期间疏散避难所的管辖权分配就是其中一项措施。本文讨论了两个以旅游住宿为临时避难所的疏散案例。一种是疏散到最近的避难所,另一种是使用我们之前提出的优化方法来分配避难所的管辖权。考察了旅游住宿对疏散人员溢出的影响。本文还通过数值算例说明了旅游住宿作为临时避难所可以减少避难所中疏散人员的溢出。我们认为它的影响是有限的,以日本的一个城市为例,那里的疏散区和居民区间隔很广。
{"title":"Impacts of Tourist Accommodations as Temporal Shelter on Evacuee Overflow for the Reassignment of Shelters Jurisdiction","authors":"Yu Ichifuji, N. Koide, N. Sonehara","doi":"10.1109/ARES.2015.66","DOIUrl":"https://doi.org/10.1109/ARES.2015.66","url":null,"abstract":"Effective measures against natural disasters are needed worldwide, and the jurisdiction assignment of evacuation shelters during natural disasters is one such measure. In this paper, we discuss two evacuation cases involving tourist accommodations as temporary shelters. One involves evacuation to the closest shelter, and the other involves using our previously proposed optimization method for assigning jurisdiction for shelters. The impact of tourist accommodations on evacuee overflow for each case was investigated. We also explain that tourist accommodations as temporary shelter reduce the evacuee overflow at shelters by using a numerical example. We argue that its impact is limited by giving an example of a city in Japan where the evacuation and residential areas are widely spaced.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"74 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116307834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of a Sector-Hash Based Rapid File Detection Method for Monitoring Infrastructure-as-a-Service Cloud Platforms 基于扇区哈希的基础设施即服务云平台快速文件检测方法评估
Manabu Hirano, Hayate Takase, Koki Yoshida
Current computer forensics tools have some limitations on anti-forensics attacks, cloud computing, and a large increase in the size of forensics targets. To solve these problems, this paper proposes a system that preserves storage data on virtual machines by acquiring all data sectors with time stamps. The proposed system can restore a previous state of a block device at any date and time that is specified by an investigator. The proposed system aims to monitor users' behavior in Infrastructure-as-a-Service (IaaS) cloud platforms. This paper also presents a rapid file detection system that finds a target file from a large collection of the acquired data sectors by using sector-hashes and parallel distributed processing. This system enables investigators to track and to find a target file that is related to incidents or crimes in the cloud. First, this paper reports the preliminary experiments of a sector-hash based file detection method on three major operating systems for evaluating its effectiveness. We present a design and an implementation of the proposed monitoring and target file detection system by using Xen hypervisor and MapReduce. We report results of its performance evaluation. Finally, we discuss possible methods to improve the performance and the limitations of the current proposed mechanism.
当前的计算机取证工具在反取证攻击、云计算、取证目标规模大幅增加等方面存在一定的局限性。为了解决这些问题,本文提出了一种通过获取具有时间戳的所有数据扇区来保存虚拟机上存储数据的系统。所提出的系统可以在研究者指定的任何日期和时间恢复块设备的先前状态。该系统旨在监控基础设施即服务(IaaS)云平台中的用户行为。本文还提出了一种快速文件检测系统,该系统利用扇区哈希和并行分布式处理技术,从大量采集的数据扇区中找到目标文件。该系统使调查人员能够跟踪并找到与云中的事件或犯罪相关的目标文件。首先,本文报告了基于扇区哈希的文件检测方法在三种主要操作系统上的初步实验,以评估其有效性。本文提出了一种基于Xen hypervisor和MapReduce的目标文件监控系统的设计与实现。我们报告了其性能评估结果。最后,我们讨论了提高性能的可能方法以及当前提出的机制的局限性。
{"title":"Evaluation of a Sector-Hash Based Rapid File Detection Method for Monitoring Infrastructure-as-a-Service Cloud Platforms","authors":"Manabu Hirano, Hayate Takase, Koki Yoshida","doi":"10.1109/ARES.2015.15","DOIUrl":"https://doi.org/10.1109/ARES.2015.15","url":null,"abstract":"Current computer forensics tools have some limitations on anti-forensics attacks, cloud computing, and a large increase in the size of forensics targets. To solve these problems, this paper proposes a system that preserves storage data on virtual machines by acquiring all data sectors with time stamps. The proposed system can restore a previous state of a block device at any date and time that is specified by an investigator. The proposed system aims to monitor users' behavior in Infrastructure-as-a-Service (IaaS) cloud platforms. This paper also presents a rapid file detection system that finds a target file from a large collection of the acquired data sectors by using sector-hashes and parallel distributed processing. This system enables investigators to track and to find a target file that is related to incidents or crimes in the cloud. First, this paper reports the preliminary experiments of a sector-hash based file detection method on three major operating systems for evaluating its effectiveness. We present a design and an implementation of the proposed monitoring and target file detection system by using Xen hypervisor and MapReduce. We report results of its performance evaluation. Finally, we discuss possible methods to improve the performance and the limitations of the current proposed mechanism.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123633216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients 基于DCT系数相对关系的jpeg抗压缩自适应隐写
Yi Zhang, Xiangyang Luo, Chunfang Yang, Dengpan Ye, Fenlin Liu
Current typical adaptive Steganography algorithms cannot extract the embedded secret messages correctly after compression. In order to solve this problem, a JPEG-compression resistant adaptive steganography algorithm is proposed. Utilizing the relationship between DCT coefficients, the domain of messages embedding is determined. The modifying magnitude of different DCT coefficients can be determined according to the quality factors of JPEG compression. To ensure the completely correct extraction of embedded messages after JPEG compression, the RS codes is used to encode the messages to be embedded. Besides, based on the current energy function in the PQe steganography and the distortion function in J-UNIWARD Steganography, the corresponding distortion value of DCT coefficients is calculated. With the help of that, STCs is used to embed the encoded messages into the DCT coefficients, which have a smaller distortion value. The experimental results under different quality factors of JPEG compression and different payloads demonstrate that the proposed algorithm not only has a high correct rate of extracted messages after JPEG compression, which increases from about 60% to nearly 100% comparing with J-UNIWARD steganography under quality factor 75 of JPEG compression, but also has a strong detection resistant performance.
目前典型的自适应隐写算法在压缩后不能正确提取嵌入的秘密信息。为了解决这一问题,提出了一种抗jpeg压缩的自适应隐写算法。利用离散余波变换系数之间的关系,确定消息嵌入的域。不同DCT系数的修改幅度可以根据JPEG压缩的质量因素来确定。为了保证JPEG压缩后嵌入消息的提取完全正确,采用RS码对待嵌入消息进行编码。此外,基于PQe隐写中的当前能量函数和J-UNIWARD隐写中的失真函数,计算出相应的DCT系数失真值。利用STCs将编码后的信息嵌入到失真值较小的DCT系数中。在不同JPEG压缩质量因子和不同有效载荷下的实验结果表明,该算法不仅具有较高的JPEG压缩后提取信息的正确率,与JPEG压缩质量因子为75的J-UNIWARD隐写相比,其正确率从60%左右提高到接近100%,而且具有较强的抗检测性能。
{"title":"A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients","authors":"Yi Zhang, Xiangyang Luo, Chunfang Yang, Dengpan Ye, Fenlin Liu","doi":"10.1109/ARES.2015.53","DOIUrl":"https://doi.org/10.1109/ARES.2015.53","url":null,"abstract":"Current typical adaptive Steganography algorithms cannot extract the embedded secret messages correctly after compression. In order to solve this problem, a JPEG-compression resistant adaptive steganography algorithm is proposed. Utilizing the relationship between DCT coefficients, the domain of messages embedding is determined. The modifying magnitude of different DCT coefficients can be determined according to the quality factors of JPEG compression. To ensure the completely correct extraction of embedded messages after JPEG compression, the RS codes is used to encode the messages to be embedded. Besides, based on the current energy function in the PQe steganography and the distortion function in J-UNIWARD Steganography, the corresponding distortion value of DCT coefficients is calculated. With the help of that, STCs is used to embed the encoded messages into the DCT coefficients, which have a smaller distortion value. The experimental results under different quality factors of JPEG compression and different payloads demonstrate that the proposed algorithm not only has a high correct rate of extracted messages after JPEG compression, which increases from about 60% to nearly 100% comparing with J-UNIWARD steganography under quality factor 75 of JPEG compression, but also has a strong detection resistant performance.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122171975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Security Monitoring of HTTP Traffic Using Extended Flows 使用扩展流的HTTP流量安全监控
M. Husák, P. Velan, Jan Vykopal
In this paper, we present an analysis of HTTP traffic in a large-scale environment which uses network flow monitoring extended by parsing HTTP requests. In contrast to previously published analyses, we were the first to classify patterns of HTTP traffic which are relevant to network security. We described three classes of HTTP traffic which contain brute-force password attacks, connections to proxies, HTTP scanners, and web crawlers. Using the classification, we were able to detect up to 16 previously undetectable brute-force password attacks and 19 HTTP scans per day in our campus network. The activity of proxy servers and web crawlers was also observed. Symptoms of these attacks may be detected by other methods based on traditional flow monitoring, but detection using the analysis of HTTP requests is more straightforward. We, thus, confirm the added value of extended flow monitoring in comparison to the traditional method.
在本文中,我们提出了一种大规模环境下的HTTP流量分析方法,该方法通过解析HTTP请求来扩展网络流量监控。与之前发表的分析相反,我们是第一个对与网络安全相关的HTTP流量模式进行分类的人。我们描述了三类HTTP流量,它们包含暴力破解密码攻击、代理连接、HTTP扫描器和网络爬虫。使用这种分类,我们能够在校园网络中每天检测到多达16次以前无法检测到的暴力破解密码攻击和19次HTTP扫描。代理服务器和网络爬虫的活动也被观察到。这些攻击的症状可以通过基于传统流量监控的其他方法检测到,但使用HTTP请求分析进行检测更为直接。因此,与传统方法相比,我们确认了扩展流量监测的附加价值。
{"title":"Security Monitoring of HTTP Traffic Using Extended Flows","authors":"M. Husák, P. Velan, Jan Vykopal","doi":"10.1109/ARES.2015.42","DOIUrl":"https://doi.org/10.1109/ARES.2015.42","url":null,"abstract":"In this paper, we present an analysis of HTTP traffic in a large-scale environment which uses network flow monitoring extended by parsing HTTP requests. In contrast to previously published analyses, we were the first to classify patterns of HTTP traffic which are relevant to network security. We described three classes of HTTP traffic which contain brute-force password attacks, connections to proxies, HTTP scanners, and web crawlers. Using the classification, we were able to detect up to 16 previously undetectable brute-force password attacks and 19 HTTP scans per day in our campus network. The activity of proxy servers and web crawlers was also observed. Symptoms of these attacks may be detected by other methods based on traditional flow monitoring, but detection using the analysis of HTTP requests is more straightforward. We, thus, confirm the added value of extended flow monitoring in comparison to the traditional method.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116653988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
The Role and Security of Firewalls in IaaS Cloud Computing 防火墙在IaaS云计算中的作用与安全性
Jordan Cropper, Johanna Ullrich, P. Frühwirt, E. Weippl
Cloud computing is playing an ever larger role in the IT infrastructure. The migration into the cloud means that we must rethink and adapt our security measures. Ultimately, both the cloud provider and the customer have to accept responsibilities to ensure security best practices are followed. Firewalls are one of the most critical security features. Most IaaS providers make firewalls available to their customers. In most cases, the customer assumes a best-case working scenario which is often not assured. In this paper, we studied the filtering behavior of firewalls provided by five different cloud providers. We found that three providers have firewalls available within their infrastructure. Based on our findings, we developed an open-ended firewall monitoring tool which can be used by cloud customers to understand the firewall's filtering behavior. This information can then be efficiently used for risk management and further security considerations. Measuring today's firewalls has shown that they perform well for the basics, although may not be fully featured considering fragmentation or stateful behavior.
云计算在IT基础设施中扮演着越来越重要的角色。向云的迁移意味着我们必须重新考虑和调整我们的安全措施。最终,云提供商和客户都必须承担责任,确保遵循安全最佳实践。防火墙是最关键的安全特性之一。大多数IaaS提供商都向其客户提供防火墙。在大多数情况下,客户会假设一个最佳情况的工作场景,而这通常是不确定的。在本文中,我们研究了五个不同的云提供商提供的防火墙的过滤行为。我们发现有三家提供商在其基础设施中提供了可用的防火墙。基于我们的发现,我们开发了一个开放式防火墙监控工具,云客户可以使用它来了解防火墙的过滤行为。然后,这些信息可以有效地用于风险管理和进一步的安全考虑。对当今防火墙的测量表明,它们在基本方面表现良好,尽管考虑到碎片或有状态行为,它们可能没有完全发挥功能。
{"title":"The Role and Security of Firewalls in IaaS Cloud Computing","authors":"Jordan Cropper, Johanna Ullrich, P. Frühwirt, E. Weippl","doi":"10.1109/ARES.2015.50","DOIUrl":"https://doi.org/10.1109/ARES.2015.50","url":null,"abstract":"Cloud computing is playing an ever larger role in the IT infrastructure. The migration into the cloud means that we must rethink and adapt our security measures. Ultimately, both the cloud provider and the customer have to accept responsibilities to ensure security best practices are followed. Firewalls are one of the most critical security features. Most IaaS providers make firewalls available to their customers. In most cases, the customer assumes a best-case working scenario which is often not assured. In this paper, we studied the filtering behavior of firewalls provided by five different cloud providers. We found that three providers have firewalls available within their infrastructure. Based on our findings, we developed an open-ended firewall monitoring tool which can be used by cloud customers to understand the firewall's filtering behavior. This information can then be efficiently used for risk management and further security considerations. Measuring today's firewalls has shown that they perform well for the basics, although may not be fully featured considering fragmentation or stateful behavior.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"65 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114003827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2015 10th International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1