首页 > 最新文献

2015 10th International Conference on Availability, Reliability and Security最新文献

英文 中文
Cross-Domain Attribute Conversion for Authentication and Authorization 认证和授权的跨域属性转换
S. Thaler, J. D. Hartog, D. Ayed, Dieter Sommer, M. Hitchens
In bio-security emergencies, such as an outbreak of an exotic animal disease, it is essential that the organizations involved in combating this outbreak collaborate effectively and efficiently. To achieve such a collaboration potentially confidential infrastructure and resources need to be shared amongst members of the participating organizations. In AU2EU we demonstrate the combination of existing data minimizing authentication, attribute-based authorization technologies to dynamically enable collaborations between these organization. However, a key problem that occurs during the establishment of such collaboration is different terminologies for similar authorization attributes. To overcome these differences and to minimize the overhead for new organizations to join an existing consortium we propose an ontology-based solution for converting attributes from one domain vocabulary to another. Additionally, we propose a methodology to construct a shared domain vocabulary. Using a shared domain vocabulary in the conversion process decreases the amount of alignments required for collaborating. We integrate and demonstrate the feasibility of this approach in a real-life scenario within the scope of AU2EU. This paper presents preliminary work, which is currently being deployed and will be evaluated in the upcoming months.
在生物安全紧急情况中,例如外来动物疾病的爆发,参与防治这一疾病爆发的各组织必须进行有效和高效的合作。为了实现这种协作,需要在参与组织的成员之间共享潜在的机密基础设施和资源。在AU2EU中,我们演示了现有数据最小化身份验证和基于属性的授权技术的组合,以动态地支持这些组织之间的协作。然而,在建立这种协作过程中出现的一个关键问题是类似的授权属性使用不同的术语。为了克服这些差异并最小化新组织加入现有联盟的开销,我们提出了一种基于本体的解决方案,用于将属性从一个领域词汇表转换为另一个领域词汇表。此外,我们还提出了一种构建共享领域词汇表的方法。在转换过程中使用共享领域词汇表可以减少协作所需的对齐量。我们在AU2EU范围内的现实场景中集成并演示了该方法的可行性。本文介绍了目前正在部署的初步工作,并将在未来几个月内进行评估。
{"title":"Cross-Domain Attribute Conversion for Authentication and Authorization","authors":"S. Thaler, J. D. Hartog, D. Ayed, Dieter Sommer, M. Hitchens","doi":"10.1109/ARES.2015.41","DOIUrl":"https://doi.org/10.1109/ARES.2015.41","url":null,"abstract":"In bio-security emergencies, such as an outbreak of an exotic animal disease, it is essential that the organizations involved in combating this outbreak collaborate effectively and efficiently. To achieve such a collaboration potentially confidential infrastructure and resources need to be shared amongst members of the participating organizations. In AU2EU we demonstrate the combination of existing data minimizing authentication, attribute-based authorization technologies to dynamically enable collaborations between these organization. However, a key problem that occurs during the establishment of such collaboration is different terminologies for similar authorization attributes. To overcome these differences and to minimize the overhead for new organizations to join an existing consortium we propose an ontology-based solution for converting attributes from one domain vocabulary to another. Additionally, we propose a methodology to construct a shared domain vocabulary. Using a shared domain vocabulary in the conversion process decreases the amount of alignments required for collaborating. We integrate and demonstrate the feasibility of this approach in a real-life scenario within the scope of AU2EU. This paper presents preliminary work, which is currently being deployed and will be evaluated in the upcoming months.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132786415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Publicly Verifiable Private Aggregation of Time-Series Data 可公开验证的私有时间序列数据聚合
B. Bakondi, Andreas Peter, M. Everts, P. Hartel, W. Jonker
Aggregation of time-series data offers the possibility to learn certain statistics over data periodically uploaded by different sources. In case of privacy sensitive data, it is desired to hide every data provider's individual values from the other participants (including the data aggregator). Existing privacy preserving time-series data aggregation schemes focus on the sum as aggregation means, since it is the most essential statistics used in many applications such as smart metering, participatory sensing, or appointment scheduling. However, all existing schemes have an important drawback: they do not provide verifiable outputs, thus users have to trust the data aggregator that it does not output fake values. We propose a publicly verifiable data aggregation scheme for privacy preserving time-series data summation. We prove its security and verifiability under the XDH assumption and a widely used, strong variant of the Co-CDH assumption. Moreover, our scheme offers low computation complexity on the users' side, which is essential in many applications.
时间序列数据的聚合提供了学习由不同来源定期上传的数据的某些统计信息的可能性。对于隐私敏感数据,希望对其他参与者(包括数据聚合器)隐藏每个数据提供者的单个值。现有的保护隐私的时间序列数据聚合方案将总和作为聚合手段,因为它是许多应用程序(如智能计量、参与式感知或预约调度)中使用的最基本的统计数据。然而,所有现有的方案都有一个重要的缺点:它们不提供可验证的输出,因此用户必须相信数据聚合器不会输出假值。提出了一种可公开验证的时间序列数据聚合方案。我们在XDH假设和Co-CDH假设的一个广泛使用的强变体下证明了它的安全性和可验证性。此外,我们的方案在用户端提供了较低的计算复杂度,这在许多应用中是必不可少的。
{"title":"Publicly Verifiable Private Aggregation of Time-Series Data","authors":"B. Bakondi, Andreas Peter, M. Everts, P. Hartel, W. Jonker","doi":"10.1109/ARES.2015.82","DOIUrl":"https://doi.org/10.1109/ARES.2015.82","url":null,"abstract":"Aggregation of time-series data offers the possibility to learn certain statistics over data periodically uploaded by different sources. In case of privacy sensitive data, it is desired to hide every data provider's individual values from the other participants (including the data aggregator). Existing privacy preserving time-series data aggregation schemes focus on the sum as aggregation means, since it is the most essential statistics used in many applications such as smart metering, participatory sensing, or appointment scheduling. However, all existing schemes have an important drawback: they do not provide verifiable outputs, thus users have to trust the data aggregator that it does not output fake values. We propose a publicly verifiable data aggregation scheme for privacy preserving time-series data summation. We prove its security and verifiability under the XDH assumption and a widely used, strong variant of the Co-CDH assumption. Moreover, our scheme offers low computation complexity on the users' side, which is essential in many applications.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130224311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Monitoring in the Cloud: An SLA-Based Approach 云中的安全监控:基于sla的方法
V. Casola, Alessandra De Benedictis, M. Rak
In this paper we present a monitoring architecture that is automatically configured and activated based on a signed Security SLA. Such monitoring architecture integrates different security-related monitoring tools (either developed ad-hoc or already available as open-source or commercial products) to collect measurements related to specific metrics associated with the set of security Service Level Objectives (SLOs) that have been specified in the Security SLA. To demonstrate our approach, we discuss a case study related to detection and management of vulnerabilities and illustrate the integration of the popular open source monitoring system Open VAS into our monitoring architecture. We show how the system is configured and activated by means of available Cloud automation technologies and provide a concrete example of related SLOs and metrics.
在本文中,我们提出了一个监视体系结构,该体系结构基于已签名的安全SLA自动配置和激活。这种监视体系结构集成了不同的与安全相关的监视工具(无论是开发的特别工具,还是已经作为开源或商业产品提供的工具),以收集与安全SLA中指定的安全服务水平目标(slo)集相关的特定度量相关的度量。为了演示我们的方法,我们讨论了一个与漏洞检测和管理相关的案例研究,并说明了将流行的开源监控系统open VAS集成到我们的监控体系结构中。我们展示了如何通过可用的云自动化技术配置和激活系统,并提供了相关slo和指标的具体示例。
{"title":"Security Monitoring in the Cloud: An SLA-Based Approach","authors":"V. Casola, Alessandra De Benedictis, M. Rak","doi":"10.1109/ARES.2015.74","DOIUrl":"https://doi.org/10.1109/ARES.2015.74","url":null,"abstract":"In this paper we present a monitoring architecture that is automatically configured and activated based on a signed Security SLA. Such monitoring architecture integrates different security-related monitoring tools (either developed ad-hoc or already available as open-source or commercial products) to collect measurements related to specific metrics associated with the set of security Service Level Objectives (SLOs) that have been specified in the Security SLA. To demonstrate our approach, we discuss a case study related to detection and management of vulnerabilities and illustrate the integration of the popular open source monitoring system Open VAS into our monitoring architecture. We show how the system is configured and activated by means of available Cloud automation technologies and provide a concrete example of related SLOs and metrics.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123879064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
A Secure Integrated Platform for Rapdily Formed Multiorganisation Collaborations 快速形成的多组织协作的安全集成平台
J. Zic, N. Oakes, Dongxi Liu, Jane Li, Chen Wang, Shiping Chen
Establishing secure collaborations between multiple organisations, potentially who are in competitors, requires substantial careful attention to how information is exchanged during the collaboration, from the formulation of policies and agreements between the organisations that govern the collaboration at the most abstract level, through to authentication and authorisation services and down to secure network and storage infrastructure. This paper presents a high level description of the secure integrated collaboration platform for distributed groups that has been developed and deployed as a part of a pilot for the AU2EU project. This secure platform utilises advanced eAuthentication and eAuthorisation services integrated into an advanced real-time collaborative system offering high definition telepresence combined with a secure common shared workspace that gives capability based collaborative access to specialised instruments, data sets and images.
在多个组织(可能是竞争对手)之间建立安全协作,需要非常仔细地关注在协作期间如何交换信息,从在最抽象的级别上管理协作的组织之间的政策和协议的制定,到身份验证和授权服务,再到安全的网络和存储基础设施。本文对分布式组的安全集成协作平台进行了高级描述,该平台已作为AU2EU项目试点的一部分开发和部署。该安全平台将先进的电子认证和电子授权服务集成到先进的实时协作系统中,提供高清晰度远程呈现,并结合安全的公共共享工作空间,提供基于能力的协作访问专用仪器,数据集和图像。
{"title":"A Secure Integrated Platform for Rapdily Formed Multiorganisation Collaborations","authors":"J. Zic, N. Oakes, Dongxi Liu, Jane Li, Chen Wang, Shiping Chen","doi":"10.1109/ARES.2015.73","DOIUrl":"https://doi.org/10.1109/ARES.2015.73","url":null,"abstract":"Establishing secure collaborations between multiple organisations, potentially who are in competitors, requires substantial careful attention to how information is exchanged during the collaboration, from the formulation of policies and agreements between the organisations that govern the collaboration at the most abstract level, through to authentication and authorisation services and down to secure network and storage infrastructure. This paper presents a high level description of the secure integrated collaboration platform for distributed groups that has been developed and deployed as a part of a pilot for the AU2EU project. This secure platform utilises advanced eAuthentication and eAuthorisation services integrated into an advanced real-time collaborative system offering high definition telepresence combined with a secure common shared workspace that gives capability based collaborative access to specialised instruments, data sets and images.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"320 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128017839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Reconnaissance with IPv6: A Pattern-Based Scanning Approach IPv6侦察:一种基于模式的扫描方法
Johanna Ullrich, Peter Kieseberg, Katharina Krombholz, E. Weippl
Today's capability of fast Internet-wide scanning allows insights into the Internet ecosystem, but the on-going transition to the new Internet Protocol version 6 (IPv6) makes the approach of probing all possible addresses infeasible, even at current speeds of more than a million probes per second. As a consequence, the exploitation of frequent patterns has been proposed to reduce the search space. Current patterns are manually crafted and based on educated guesses of administrators. At the time of writing, their adequacy has not yet been evaluated. In this paper, we assess the idea of pattern-based scanning for the first time, and use an experimental set-up in combination with three real-world data sets. In addition, we developed a pattern-based algorithm that automatically discovers patterns in a sample and generates addresses for scanning based on its findings. Our experimental results confirm that pattern-based scanning is a promising approach for IPv6 reconnaissance, but also that currently known patterns are of limited benefit and are outperformed by our new algorithm. Our algorithm not only discovers more addresses, but also finds implicit patterns. Furthermore, it is more adaptable to future changes in IPv6 addressing and harder to mitigate than approaches with manually crafted patterns.
如今,快速的全互联网扫描能力使人们能够深入了解互联网生态系统,但正在进行的向新互联网协议版本6 (IPv6)的过渡使得探测所有可能的地址的方法变得不可行,即使在目前每秒超过一百万次探测的速度下。因此,人们提出利用频繁模式来减少搜索空间。当前的模式是手工制作的,并且基于管理员的有根据的猜测。在编写本报告时,尚未对其充分性进行评价。在本文中,我们首次评估了基于模式的扫描的想法,并结合三个真实世界的数据集使用了一个实验设置。此外,我们开发了一种基于模式的算法,可以自动发现样本中的模式,并根据其发现生成扫描地址。我们的实验结果证实,基于模式的扫描是一种很有前途的IPv6侦察方法,但目前已知的模式的好处有限,并且被我们的新算法超越。我们的算法不仅发现了更多的地址,而且发现了隐含的模式。此外,它更能适应IPv6寻址的未来变化,而且比手工制作模式的方法更难缓解。
{"title":"On Reconnaissance with IPv6: A Pattern-Based Scanning Approach","authors":"Johanna Ullrich, Peter Kieseberg, Katharina Krombholz, E. Weippl","doi":"10.1109/ARES.2015.48","DOIUrl":"https://doi.org/10.1109/ARES.2015.48","url":null,"abstract":"Today's capability of fast Internet-wide scanning allows insights into the Internet ecosystem, but the on-going transition to the new Internet Protocol version 6 (IPv6) makes the approach of probing all possible addresses infeasible, even at current speeds of more than a million probes per second. As a consequence, the exploitation of frequent patterns has been proposed to reduce the search space. Current patterns are manually crafted and based on educated guesses of administrators. At the time of writing, their adequacy has not yet been evaluated. In this paper, we assess the idea of pattern-based scanning for the first time, and use an experimental set-up in combination with three real-world data sets. In addition, we developed a pattern-based algorithm that automatically discovers patterns in a sample and generates addresses for scanning based on its findings. Our experimental results confirm that pattern-based scanning is a promising approach for IPv6 reconnaissance, but also that currently known patterns are of limited benefit and are outperformed by our new algorithm. Our algorithm not only discovers more addresses, but also finds implicit patterns. Furthermore, it is more adaptable to future changes in IPv6 addressing and harder to mitigate than approaches with manually crafted patterns.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115629338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Integrating Human Behavior Into the Development of Future Cyberterrorism Scenarios 将人类行为整合到未来网络恐怖主义场景的发展中
Pub Date : 2015-08-24 DOI: 10.1109/ARES.2015.105
M. Kilger
The development of future cyber terrorism scenarios is a key component in building a more comprehensive understanding of cyber threats that are likely to emerge in the near-to mid-term future. While developing concepts of likely new, emerging digital technologies is an important part of this process, this article suggests that understanding the psychological and social forces involved in cyber terrorism is also a key component in the analysis and that the synergy of these two dimensions may produce more accurate and detailed future cyber threat scenarios than either analytical element alone.
未来网络恐怖主义情景的发展是建立对可能在近期到中期出现的网络威胁的更全面理解的关键组成部分。虽然开发可能的新兴数字技术概念是这一过程的重要组成部分,但本文认为,理解网络恐怖主义中涉及的心理和社会力量也是分析的关键组成部分,这两个维度的协同作用可能比单独的任何一个分析元素产生更准确和详细的未来网络威胁情景。
{"title":"Integrating Human Behavior Into the Development of Future Cyberterrorism Scenarios","authors":"M. Kilger","doi":"10.1109/ARES.2015.105","DOIUrl":"https://doi.org/10.1109/ARES.2015.105","url":null,"abstract":"The development of future cyber terrorism scenarios is a key component in building a more comprehensive understanding of cyber threats that are likely to emerge in the near-to mid-term future. While developing concepts of likely new, emerging digital technologies is an important part of this process, this article suggests that understanding the psychological and social forces involved in cyber terrorism is also a key component in the analysis and that the synergy of these two dimensions may produce more accurate and detailed future cyber threat scenarios than either analytical element alone.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123984566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Non-Invasive Wiretaps 通过非侵入式窃听技术对云托管服务器进行取证和调查
Hessel Schut, M. Scanlon, Jason Farina, Nhien-An Le-Khac
When conducting modern cybercrime investigations, evidence has often to be gathered from computer systems located at cloud-based data centres of hosting providers. In cases where the investigation cannot rely on the cooperation of the hosting provider, or where documentation is not available, investigators can often find the identification of which distinct server among many is of interest difficult and extremely time consuming. To address the problem of identifying these servers, in this paper a new approach to rapidly and reliably identify these cloud hosting computer systems is presented. In the outlined approach, a handheld device composed of an embedded computer combined with a method of undetectable interception of Ethernet based communications is presented. This device is tested and evaluated, and a discussion is provided on its usefulness in identifying of server of interest to an investigation.
在进行现代网络犯罪调查时,通常需要从托管提供商的云数据中心的计算机系统中收集证据。如果调查不能依赖于托管提供商的合作,或者无法获得文件,调查人员往往会发现,在众多服务器中确定哪一台是值得关注的,既困难又极其耗时。为了解决这些服务器的识别问题,本文提出了一种快速、可靠地识别这些云托管计算机系统的新方法。在概述的方法中,提出了一种手持设备,该设备由嵌入式计算机与基于以太网的通信的不可检测拦截方法相结合。对该设备进行了测试和评估,并讨论了其在确定调查中感兴趣的服务器方面的有用性。
{"title":"Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Non-Invasive Wiretaps","authors":"Hessel Schut, M. Scanlon, Jason Farina, Nhien-An Le-Khac","doi":"10.1109/ARES.2015.77","DOIUrl":"https://doi.org/10.1109/ARES.2015.77","url":null,"abstract":"When conducting modern cybercrime investigations, evidence has often to be gathered from computer systems located at cloud-based data centres of hosting providers. In cases where the investigation cannot rely on the cooperation of the hosting provider, or where documentation is not available, investigators can often find the identification of which distinct server among many is of interest difficult and extremely time consuming. To address the problem of identifying these servers, in this paper a new approach to rapidly and reliably identify these cloud hosting computer systems is presented. In the outlined approach, a handheld device composed of an embedded computer combined with a method of undetectable interception of Ethernet based communications is presented. This device is tested and evaluated, and a discussion is provided on its usefulness in identifying of server of interest to an investigation.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117141482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Comprehensive Approach to Increase Cyber Security and Resilience 提高网络安全和弹性的综合方法
M. Choraś, R. Kozik, Maria Pilar Torres Bruna, A. Yautsiukhin, Andrew Churchill, Iwona Maciejewska, I. Eguinoa, Adel Jomni
In this paper the initial results of the European project CAMINO in terms of the realistic roadmap to counter cyber crime and cyber terrorism are presented. The roadmap is built in accordance to so called CAMINO THOR approach, where cyber security is perceived comprehensively in 4 dimensions: Technical, Human, Organisational, and Regulatory.
本文介绍了欧洲项目CAMINO在打击网络犯罪和网络恐怖主义的现实路线图方面的初步成果。该路线图是根据所谓的CAMINO THOR方法构建的,其中网络安全从四个方面进行全面感知:技术,人力,组织和监管。
{"title":"Comprehensive Approach to Increase Cyber Security and Resilience","authors":"M. Choraś, R. Kozik, Maria Pilar Torres Bruna, A. Yautsiukhin, Andrew Churchill, Iwona Maciejewska, I. Eguinoa, Adel Jomni","doi":"10.1109/ARES.2015.30","DOIUrl":"https://doi.org/10.1109/ARES.2015.30","url":null,"abstract":"In this paper the initial results of the European project CAMINO in terms of the realistic roadmap to counter cyber crime and cyber terrorism are presented. The roadmap is built in accordance to so called CAMINO THOR approach, where cyber security is perceived comprehensively in 4 dimensions: Technical, Human, Organisational, and Regulatory.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117347401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Event Prediction with Community Leaders 与社区领袖一起预测事件
Jun Pang, Yang Zhang
With the emerging of online social network services, quantitative studies on social influence become achievable. Leadership is one of the most intuitive and common forms for social influence, understanding it could result in appealing applications such as targeted advertising and viral marketing. In this work, we focus on investigating leaders' influence for event prediction in social networks. We propose an algorithm based on events that users conduct to discover leaders in social communities. Analysis on the leaders that we found on a real-life social network dataset leads us to several interesting observations, such as that leaders do not have significantly higher number of friends but are more active than other community members. We demonstrate the effectiveness of leaders' influence on users' behaviors by learning tasks: given a leader has conducted one event, whether and when a user will perform the event. Experimental results show that with only a few leaders in a community the event predictions are always very effective.
随着在线社交网络服务的兴起,对社交影响力的定量研究成为可能。领导力是社会影响力最直观和最常见的形式之一,理解它可以产生有吸引力的应用,如定向广告和病毒式营销。在这项工作中,我们重点研究了社会网络中领导者对事件预测的影响。我们提出了一种基于用户行为的算法来发现社会社区中的领导者。通过对现实生活中的社交网络数据集的分析,我们发现了一些有趣的观察结果,比如,领导者的朋友数量并没有明显增加,但他们比其他社区成员更活跃。我们通过学习任务来证明领导者对用户行为影响的有效性:给定领导者进行了一个事件,用户是否以及何时会执行该事件。实验结果表明,当社区中只有少数领导者时,事件预测总是非常有效的。
{"title":"Event Prediction with Community Leaders","authors":"Jun Pang, Yang Zhang","doi":"10.1109/ARES.2015.24","DOIUrl":"https://doi.org/10.1109/ARES.2015.24","url":null,"abstract":"With the emerging of online social network services, quantitative studies on social influence become achievable. Leadership is one of the most intuitive and common forms for social influence, understanding it could result in appealing applications such as targeted advertising and viral marketing. In this work, we focus on investigating leaders' influence for event prediction in social networks. We propose an algorithm based on events that users conduct to discover leaders in social communities. Analysis on the leaders that we found on a real-life social network dataset leads us to several interesting observations, such as that leaders do not have significantly higher number of friends but are more active than other community members. We demonstrate the effectiveness of leaders' influence on users' behaviors by learning tasks: given a leader has conducted one event, whether and when a user will perform the event. Experimental results show that with only a few leaders in a community the event predictions are always very effective.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132619316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Network-Based HTTPS Client Identification Using SSL/TLS Fingerprinting 基于网络的HTTPS客户端SSL/TLS指纹识别
M. Husák, Milan Cermák, Tomás Jirsík, Pavel Čeleda
The growing share of encrypted network traffic complicates network traffic analysis and network forensics. In this paper, we present real-time lightweight identification of HTTPS clients based on network monitoring and SSL/TLS fingerprinting. Our experiment shows that it is possible to estimate the User-Agent of a client in HTTPS communication via the analysis of the SSL/TLS handshake. The fingerprints of SSL/TLS handshakes, including a list of supported cipher suites, differ among clients and correlate to User-Agent values from a HTTP header. We built up a dictionary of SSL/TLS cipher suite lists and HTTP User-Agents and assigned the User-Agents to the observed SSL/TLS connections to identify communicating clients. We discuss host-based and network-based methods of dictionary retrieval and estimate the quality of the data. The usability of the proposed method is demonstrated on two case studies of network forensics.
加密网络流量所占的份额越来越大,使得网络流量分析和网络取证变得更加复杂。本文提出了一种基于网络监控和SSL/TLS指纹的实时轻量级HTTPS客户端识别方法。我们的实验表明,可以通过分析SSL/TLS握手来估计HTTPS通信中客户端的User-Agent。SSL/TLS握手的指纹,包括支持的密码套件列表,在客户端之间是不同的,并且与来自HTTP报头的User-Agent值相关。我们建立了SSL/TLS密码套件列表和HTTP用户代理的字典,并将用户代理分配给观察到的SSL/TLS连接,以识别通信客户端。我们讨论了基于主机和基于网络的词典检索方法,并估计了数据的质量。在两个网络取证案例研究中证明了该方法的可用性。
{"title":"Network-Based HTTPS Client Identification Using SSL/TLS Fingerprinting","authors":"M. Husák, Milan Cermák, Tomás Jirsík, Pavel Čeleda","doi":"10.1109/ARES.2015.35","DOIUrl":"https://doi.org/10.1109/ARES.2015.35","url":null,"abstract":"The growing share of encrypted network traffic complicates network traffic analysis and network forensics. In this paper, we present real-time lightweight identification of HTTPS clients based on network monitoring and SSL/TLS fingerprinting. Our experiment shows that it is possible to estimate the User-Agent of a client in HTTPS communication via the analysis of the SSL/TLS handshake. The fingerprints of SSL/TLS handshakes, including a list of supported cipher suites, differ among clients and correlate to User-Agent values from a HTTP header. We built up a dictionary of SSL/TLS cipher suite lists and HTTP User-Agents and assigned the User-Agents to the observed SSL/TLS connections to identify communicating clients. We discuss host-based and network-based methods of dictionary retrieval and estimate the quality of the data. The usability of the proposed method is demonstrated on two case studies of network forensics.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132072963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
期刊
2015 10th International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1