首页 > 最新文献

EAI Endorsed Trans. Security Safety最新文献

英文 中文
Security of HPC Systems: From a Log-analyzing Perspective 高性能计算系统的安全性:从日志分析的角度
Pub Date : 2019-08-01 DOI: 10.4108/eai.19-8-2019.163134
Zhengping Luo, Zhe Qu, T. Nguyen, Hui Zeng, Zhuo Lu
High Performance Computing (HPC) systems mainly focused on how to improve performances of the computing. It has competitive processing capacity both in terms of calculation speed and available memory. HPC infrastructures are valuable computing resources that need to be carefully guarded and avoid being maliciously used. Thus, vulnerabilities are quintessential issues in HPC systems due to most of jobs and resources run or stored usually are sensitive and high-profit information. In this survey, we comprehensively review securities of HPC systems from a log-analyzing perspective, including well-known attacks and widely used defenses, especially intruder detection methods. We found that log files are used for the security purposes much less than what we expected. How to use all the available log files comprehensively and employ state-of-the-art intrusion techniques to improve the robustness of HPC systems still lies for future research.
高性能计算(HPC)系统主要关注如何提高计算性能。它在计算速度和可用内存方面都具有竞争力的处理能力。HPC基础设施是宝贵的计算资源,需要小心保护,避免被恶意使用。因此,漏洞是高性能计算系统中的典型问题,因为运行或存储的大多数作业和资源通常是敏感和高利润的信息。在本次调查中,我们从日志分析的角度全面回顾了高性能计算系统的安全性,包括众所周知的攻击和广泛使用的防御措施,特别是入侵者检测方法。我们发现用于安全目的的日志文件比我们预期的要少得多。如何综合利用所有可用的日志文件,并采用最先进的入侵技术来提高高性能计算系统的鲁棒性,仍然是未来研究的课题。
{"title":"Security of HPC Systems: From a Log-analyzing Perspective","authors":"Zhengping Luo, Zhe Qu, T. Nguyen, Hui Zeng, Zhuo Lu","doi":"10.4108/eai.19-8-2019.163134","DOIUrl":"https://doi.org/10.4108/eai.19-8-2019.163134","url":null,"abstract":"High Performance Computing (HPC) systems mainly focused on how to improve performances of the computing. It has competitive processing capacity both in terms of calculation speed and available memory. HPC infrastructures are valuable computing resources that need to be carefully guarded and avoid being maliciously used. Thus, vulnerabilities are quintessential issues in HPC systems due to most of jobs and resources run or stored usually are sensitive and high-profit information. In this survey, we comprehensively review securities of HPC systems from a log-analyzing perspective, including well-known attacks and widely used defenses, especially intruder detection methods. We found that log files are used for the security purposes much less than what we expected. How to use all the available log files comprehensively and employ state-of-the-art intrusion techniques to improve the robustness of HPC systems still lies for future research.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133524909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Do Metadata-based Deleted-File-Recovery (DFR) Tools Meet NIST Guidelines? 基于元数据的删除文件恢复(DFR)工具是否符合NIST指南?
Pub Date : 2019-08-01 DOI: 10.4108/eai.13-7-2018.163091
Andrew Meyer, Sankardas Roy
Digital forensics (DF) tools are used for post-mortem investigation of cyber-crimes. CFTT (Computer Forensics Tool Testing) Program at National Institute of Standards and Technology (NIST) has defined expectations for a DF tool’s behavior. Understanding these expectations and how DF tools work is critical for ensuring integrity of the forensic analysis results. In this paper, we consider standardization of one class of DF tools which are for Deleted File Recovery (DFR). We design a list of canonical test file system images to evaluate a DFR tool. Via extensive experiments we find that many popular DFR tools do not satisfy some of the standards, and we compile a comparative analysis of these tools, which could help the user choose the right tool. Furthermore, one of our research questions identifies the factors which make a DFR tool fail. Moreover, we also provide critique on applicability of the standards. Our findings is likely to trigger more research on compliance of standards from the researcher community as well as the practitioners.
数字取证(DF)工具用于网络犯罪的事后调查。美国国家标准与技术研究院(NIST)的CFTT(计算机取证工具测试)项目已经定义了对DF工具行为的期望。了解这些期望以及DF工具如何工作对于确保取证分析结果的完整性至关重要。本文考虑了一类用于删除文件恢复(DFR)的DF工具的标准化问题。我们设计了一个标准测试文件系统映像列表来评估DFR工具。通过大量的实验,我们发现许多流行的DFR工具不满足某些标准,我们对这些工具进行了比较分析,可以帮助用户选择合适的工具。此外,我们的研究问题之一确定了使DFR工具失败的因素。此外,我们还对标准的适用性提出了批评。我们的发现可能会引发更多的研究人员社区以及从业者对标准的遵从性的研究。
{"title":"Do Metadata-based Deleted-File-Recovery (DFR) Tools Meet NIST Guidelines?","authors":"Andrew Meyer, Sankardas Roy","doi":"10.4108/eai.13-7-2018.163091","DOIUrl":"https://doi.org/10.4108/eai.13-7-2018.163091","url":null,"abstract":"Digital forensics (DF) tools are used for post-mortem investigation of cyber-crimes. CFTT (Computer Forensics Tool Testing) Program at National Institute of Standards and Technology (NIST) has defined expectations for a DF tool’s behavior. Understanding these expectations and how DF tools work is critical for ensuring integrity of the forensic analysis results. In this paper, we consider standardization of one class of DF tools which are for Deleted File Recovery (DFR). We design a list of canonical test file system images to evaluate a DFR tool. Via extensive experiments we find that many popular DFR tools do not satisfy some of the standards, and we compile a comparative analysis of these tools, which could help the user choose the right tool. Furthermore, one of our research questions identifies the factors which make a DFR tool fail. Moreover, we also provide critique on applicability of the standards. Our findings is likely to trigger more research on compliance of standards from the researcher community as well as the practitioners.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121244039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log 对带有机密审计日志的委托云作业进行机密状态验证
Pub Date : 2019-04-29 DOI: 10.4108/eai.13-7-2018.162290
Anyi Liu, Selena Haidar, Yuan Cheng, Yingjiu Li
{"title":"Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log","authors":"Anyi Liu, Selena Haidar, Yuan Cheng, Yingjiu Li","doi":"10.4108/eai.13-7-2018.162290","DOIUrl":"https://doi.org/10.4108/eai.13-7-2018.162290","url":null,"abstract":"","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114900064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AMASS: Automated Software Mass Customization via Feature Identification and Tailoring 通过特征识别和裁剪的自动化软件大规模定制
Pub Date : 2019-04-29 DOI: 10.4108/eai.13-7-2018.162291
Hongfa Xue, Yurong Chen, Guru Venkataramani, Tian Lan
The rapid inflation of software features brings inefficiency and vulnerabilities into programs, resulting in an increased attack surface with a higher possibility of exploitation. In this paper, we propose a novel framework for automated software mass customization (AMASS), which automatically identifies program features from binaries, tailors and eliminates the features to create customized program binaries in accordance with user needs, in a fully unsupervised fashion. It enables us to modularize program features and efficiently create customized program binaries at large scale. Evaluation using real-world executables including OpenSSL and LibreOffice demonstrates that AMASS can create a wide range of customized binaries for diverse feature requirements, with an average 92.76% accuracy for feature/function identification and up to 67% reduction of program attack surface.
软件特性的快速膨胀给程序带来了低效率和漏洞,导致攻击面增加,被利用的可能性更高。在本文中,我们提出了一种新的自动化软件大规模定制(AMASS)框架,该框架以完全无监督的方式自动从二进制文件中识别程序特征,并根据用户需求剪裁和消除特征以创建定制的程序二进制文件。它使我们能够模块化程序功能,并有效地大规模创建自定义程序二进制文件。使用包括OpenSSL和LibreOffice在内的真实可执行文件进行评估表明,AMASS可以为不同的功能需求创建广泛的定制二进制文件,特征/功能识别的平均准确率为92.76%,程序攻击面减少高达67%。
{"title":"AMASS: Automated Software Mass Customization via Feature Identification and Tailoring","authors":"Hongfa Xue, Yurong Chen, Guru Venkataramani, Tian Lan","doi":"10.4108/eai.13-7-2018.162291","DOIUrl":"https://doi.org/10.4108/eai.13-7-2018.162291","url":null,"abstract":"The rapid inflation of software features brings inefficiency and vulnerabilities into programs, resulting in an increased attack surface with a higher possibility of exploitation. In this paper, we propose a novel framework for automated software mass customization (AMASS), which automatically identifies program features from binaries, tailors and eliminates the features to create customized program binaries in accordance with user needs, in a fully unsupervised fashion. It enables us to modularize program features and efficiently create customized program binaries at large scale. Evaluation using real-world executables including OpenSSL and LibreOffice demonstrates that AMASS can create a wide range of customized binaries for diverse feature requirements, with an average 92.76% accuracy for feature/function identification and up to 67% reduction of program attack surface.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115121897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient, Effective, and Realistic Website Fingerprinting Mitigation 高效,有效和现实的网站指纹缓解
Pub Date : 2019-04-29 DOI: 10.4108/eai.29-1-2019.161977
Weiqi Cui, Jiangmin Yu, Yanmin Gong, Eric Chan-Tin
Website fingerprinting attacks have been shown to be able to predict the website visited even if the network connection is encrypted and anonymized. These attacks have achieved accuracies as high as 92%. Mitigations to these attacks are using cover/decoy network traffic to add noise, padding to ensure all the network packets are the same size, and introducing network delays to confuse an adversary. Although these mitigations have been shown to be effective, reducing the accuracy to 10%, the overhead is high. The latency overhead is above 100% and the bandwidth overhead is at least 30%. We introduce a new realistic cover traffic algorithm, based on a user’s previous network traffic, to mitigate website fingerprinting attacks. In simulations, our algorithm reduces the accuracy of attacks to 14% with zero latency overhead and about 20% bandwidth overhead. In real-world experiments, our algorithms reduces the accuracy of attacks to 16% with only 20% bandwidth overhead. Received on 30 February 2019; accepted on 20 April 2019; published on 29 April 2019
网站指纹攻击已经被证明能够预测访问的网站,即使网络连接是加密和匿名的。这些攻击的准确率高达92%。缓解这些攻击的方法是使用掩护/诱饵网络流量来增加噪音,填充以确保所有网络数据包的大小相同,并引入网络延迟以迷惑对手。尽管这些缓解措施已被证明是有效的,将准确率降低到10%,但开销很高。延迟开销大于100%,带宽开销至少为30%。我们引入了一种新的真实覆盖流量算法,基于用户以前的网络流量,以减轻网站指纹攻击。在模拟中,我们的算法在零延迟开销和约20%带宽开销的情况下,将攻击的准确率降低到14%。在现实世界的实验中,我们的算法将攻击的准确率降低到16%,而带宽开销仅为20%。2019年2月30日收到;2019年4月20日接受;发布于2019年4月29日
{"title":"Efficient, Effective, and Realistic Website Fingerprinting Mitigation","authors":"Weiqi Cui, Jiangmin Yu, Yanmin Gong, Eric Chan-Tin","doi":"10.4108/eai.29-1-2019.161977","DOIUrl":"https://doi.org/10.4108/eai.29-1-2019.161977","url":null,"abstract":"Website fingerprinting attacks have been shown to be able to predict the website visited even if the network connection is encrypted and anonymized. These attacks have achieved accuracies as high as 92%. Mitigations to these attacks are using cover/decoy network traffic to add noise, padding to ensure all the network packets are the same size, and introducing network delays to confuse an adversary. Although these mitigations have been shown to be effective, reducing the accuracy to 10%, the overhead is high. The latency overhead is above 100% and the bandwidth overhead is at least 30%. We introduce a new realistic cover traffic algorithm, based on a user’s previous network traffic, to mitigate website fingerprinting attacks. In simulations, our algorithm reduces the accuracy of attacks to 14% with zero latency overhead and about 20% bandwidth overhead. In real-world experiments, our algorithms reduces the accuracy of attacks to 16% with only 20% bandwidth overhead. Received on 30 February 2019; accepted on 20 April 2019; published on 29 April 2019","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115662384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Spill the Beans: Extrospection of Internet of Things by Exploiting Denial of Service 泄漏秘密:利用拒绝服务对物联网的展望
Pub Date : 2019-04-29 DOI: 10.4108/EAI.13-7-2018.159803
V. Sachidananda, Suhas Bhairav, Y. Elovici
Internet of Things (IoT) exposes various vulnerabilities at different levels. One such exploitable vulnerability is Denial of Service (DoS). In this work, we focus on a large-scale extensive study of various forms of DoS and how it can be exploited in different protocols of IoT. We propose an attack and defense framework called OWL which is tailored for IoT and that can perform various forms of DoS on IP, Bluetooth, and Zigbee devices. We consider various DoS vulnerabilities such as illegitimate packet injection, Bluetooth Low Energy (BLE) scanning attack, Zigbee frame counter-attack, etc., regarding IP, Bluetooth and Zigbee devices. To understand how resilient is IoT for DoS, we propose two new metrics to measure the Resilience and the Quality of Service (QoS) degradation in IoT. We have conducted large-scale experimentation with real IoT devices in our security IoT testbed. The experiments conducted are for DoS, Distributed Denial of Service (DDoS) by setting up Mirai and Permanent Denial of Service (PDoS) using BrickerBot on various IoT devices. We have also compared our framework with the existing state of the art tools. Received on 10 February 2019, accepted on 02 April 2019, published on 29 April 2019
物联网(IoT)在不同层面暴露出各种漏洞。其中一个可利用的漏洞是拒绝服务(DoS)。在这项工作中,我们专注于对各种形式的DoS的大规模广泛研究,以及如何在物联网的不同协议中利用它。我们提出了一个名为OWL的攻击和防御框架,它是为物联网量身定制的,可以在IP,蓝牙和Zigbee设备上执行各种形式的DoS。我们考虑了针对IP、蓝牙和Zigbee设备的各种DoS漏洞,如非法数据包注入、蓝牙低功耗(BLE)扫描攻击、Zigbee帧反击等。为了了解物联网对DoS的弹性,我们提出了两个新指标来衡量物联网中的弹性和服务质量(QoS)退化。我们已经在我们的安全物联网测试平台上对真实的物联网设备进行了大规模实验。通过在各种物联网设备上使用BrickerBot设置Mirai和永久拒绝服务(PDoS),进行了DoS,分布式拒绝服务(DDoS)实验。我们还将我们的框架与现有的最先进的工具进行了比较。2019年2月10日收稿,2019年4月2日收稿,2019年4月29日发布
{"title":"Spill the Beans: Extrospection of Internet of Things by Exploiting Denial of Service","authors":"V. Sachidananda, Suhas Bhairav, Y. Elovici","doi":"10.4108/EAI.13-7-2018.159803","DOIUrl":"https://doi.org/10.4108/EAI.13-7-2018.159803","url":null,"abstract":"Internet of Things (IoT) exposes various vulnerabilities at different levels. One such exploitable vulnerability is Denial of Service (DoS). In this work, we focus on a large-scale extensive study of various forms of DoS and how it can be exploited in different protocols of IoT. We propose an attack and defense framework called OWL which is tailored for IoT and that can perform various forms of DoS on IP, Bluetooth, and Zigbee devices. We consider various DoS vulnerabilities such as illegitimate packet injection, Bluetooth Low Energy (BLE) scanning attack, Zigbee frame counter-attack, etc., regarding IP, Bluetooth and Zigbee devices. To understand how resilient is IoT for DoS, we propose two new metrics to measure the Resilience and the Quality of Service (QoS) degradation in IoT. We have conducted large-scale experimentation with real IoT devices in our security IoT testbed. The experiments conducted are for DoS, Distributed Denial of Service (DDoS) by setting up Mirai and Permanent Denial of Service (PDoS) using BrickerBot on various IoT devices. We have also compared our framework with the existing state of the art tools. Received on 10 February 2019, accepted on 02 April 2019, published on 29 April 2019","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122129533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Octopus ORAM: An Oblivious RAM with Communication and Server Storage Efficiency 八达通ORAM:具有通信和服务器存储效率的遗忘RAM
Pub Date : 2019-04-29 DOI: 10.4108/eai.29-4-2019.162405
Qiumao Ma, Wensheng Zhang
Most of existing ORAM constructions have communication efficiency as the major optimization priority; the server storage efficiency, however, has not received much attention. Motivated by the observation that, the server storage efficiency is as important as communication efficiency when the storage capacity is very large and/or the outsourced data are not frequently accessed, we propose in this paper a new ORAM construction called Octopus ORAM. Through extensive security analysis and performance comparison, we demonstrate that, Octopus ORAM is secure; also, it significantly improves the server storage efficiency, achieves a comparable level of communication efficiency as state-of-the-art ORAM constructions, at the cost of increased client-side storage, and the increased client-side storage should be affordable to the clients who adopt local facilities such as cloud storage gateways. Received on 04 March 2019; accepted on 26 April 2019; published on 29 April 2019
现有的ORAM结构大多以通信效率为主要优化优先级;但是,服务器的存储效率并没有受到太多的关注。考虑到当存储容量非常大或外包数据不经常访问时,服务器存储效率与通信效率同样重要,本文提出了一种新的ORAM结构,称为Octopus ORAM。通过广泛的安全性分析和性能比较,我们证明Octopus ORAM是安全的;此外,它还显著提高了服务器存储效率,实现了与最先进的ORAM结构相当的通信效率水平,但代价是增加了客户端存储,并且增加的客户端存储对于采用本地设施(如云存储网关)的客户来说应该是负担得起的。2019年3月4日收到;2019年4月26日接受;发布于2019年4月29日
{"title":"Octopus ORAM: An Oblivious RAM with Communication and Server Storage Efficiency","authors":"Qiumao Ma, Wensheng Zhang","doi":"10.4108/eai.29-4-2019.162405","DOIUrl":"https://doi.org/10.4108/eai.29-4-2019.162405","url":null,"abstract":"Most of existing ORAM constructions have communication efficiency as the major optimization priority; the server storage efficiency, however, has not received much attention. Motivated by the observation that, the server storage efficiency is as important as communication efficiency when the storage capacity is very large and/or the outsourced data are not frequently accessed, we propose in this paper a new ORAM construction called Octopus ORAM. Through extensive security analysis and performance comparison, we demonstrate that, Octopus ORAM is secure; also, it significantly improves the server storage efficiency, achieves a comparable level of communication efficiency as state-of-the-art ORAM constructions, at the cost of increased client-side storage, and the increased client-side storage should be affordable to the clients who adopt local facilities such as cloud storage gateways. Received on 04 March 2019; accepted on 26 April 2019; published on 29 April 2019","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"76 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131456358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Methodology for the Dynamic Design of Adaptive Log Management Infrastructures 自适应日志管理基础设施的动态设计方法
Pub Date : 2019-01-29 DOI: 10.4108/EAI.25-1-2019.159347
V. Anastopoulos, S. Katsikas
Organizations collect log data for various reasons, including security related ones. The multitude and diversity of the devices that generate log records increases, resulting to dispersed networks and large volumes of data. The design of a log management infrastructure is usually led by decisions that are commonly based on industry best practices and experience, but fail to adapt to the evolving threat landscape. In this work a novel methodology for the design of a dynamic log management infrastructure is proposed. The proposed methodology leverages social network analysis to relate the infrastructure with the threat landscape, thus enabling it to evolve as threats evolve. The workings of the methodology are demonstrated by means of its application for the design of the log management infrastructure of a real organization.
组织出于各种原因收集日志数据,包括与安全相关的原因。产生日志记录的设备越来越多,种类越来越多,导致网络分散,数据量大。日志管理基础设施的设计通常由基于行业最佳实践和经验的决策主导,但无法适应不断变化的威胁环境。在这项工作中,提出了一种新的动态日志管理基础设施设计方法。所提出的方法利用社会网络分析将基础设施与威胁环境联系起来,从而使其能够随着威胁的发展而发展。通过将该方法应用于实际组织的日志管理基础设施的设计,说明了该方法的工作原理。
{"title":"A Methodology for the Dynamic Design of Adaptive Log Management Infrastructures","authors":"V. Anastopoulos, S. Katsikas","doi":"10.4108/EAI.25-1-2019.159347","DOIUrl":"https://doi.org/10.4108/EAI.25-1-2019.159347","url":null,"abstract":"Organizations collect log data for various reasons, including security related ones. The multitude and diversity of the devices that generate log records increases, resulting to dispersed networks and large volumes of data. The design of a log management infrastructure is usually led by decisions that are commonly based on industry best practices and experience, but fail to adapt to the evolving threat landscape. In this work a novel methodology for the design of a dynamic log management infrastructure is proposed. The proposed methodology leverages social network analysis to relate the infrastructure with the threat landscape, thus enabling it to evolve as threats evolve. The workings of the methodology are demonstrated by means of its application for the design of the log management infrastructure of a real organization.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122623698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Noise Injection against Side-Channel Attacks on ARM Platform 针对ARM平台侧信道攻击的自适应噪声注入
Pub Date : 2019-01-29 DOI: 10.4108/EAI.25-1-2019.159346
Naiwei Liu, Wanyu Zang, Songqing Chen, Meng Yu, R. Sandhu
In recent years, research efforts have been made to develop safe and secure environments for ARM platform. The new ARMv8 architecture brought in security features by design. However, there are still some security problems with ARMv8. For example, on Cortex-A series, there are risks that the system is vulnerable to sidechannel attacks. One major category of side-channel attacks utilizes cache memory to obtain a victim’s secret information. In the cache based side-channel attacks, an attacker measures a sequence of cache operations to obtain a victim’s memory access information, deriving more sensitive information. The success of such attacks highly depends on accurate information about the victim’s cache accesses. In this paper, we describe an innovative approach to defend against side-channel attack on Cortex-A series chips. We also considered the side-channel attacks in the context of using TrustZone protection on ARM. Our adaptive noise injection can significantly reduce the bandwidth of side-channel while maintaining an affordable system overhead. The proposed defense mechanisms can be used on ARM Cortex-A architecture. Our experimental evaluation and theoretical analysis show the effectiveness and efficiency of our proposed defense.
近年来,开发安全可靠的ARM平台环境已成为研究热点。新的ARMv8架构通过设计引入了安全特性。然而,ARMv8仍然存在一些安全问题。例如,在Cortex-A系列上,系统存在易受侧通道攻击的风险。侧信道攻击的一个主要类别是利用缓存存储器来获取受害者的秘密信息。在基于缓存的侧信道攻击中,攻击者通过测量一系列缓存操作来获取受害者的内存访问信息,从而获得更敏感的信息。这种攻击的成功高度依赖于受害者缓存访问的准确信息。在本文中,我们描述了一种创新的方法来防御对Cortex-A系列芯片的侧信道攻击。我们还考虑了在ARM上使用TrustZone保护的情况下的侧信道攻击。我们的自适应噪声注入可以显著降低侧信道的带宽,同时保持可承受的系统开销。所提出的防御机制可用于ARM Cortex-A架构。我们的实验评估和理论分析表明了我们提出的防御方法的有效性和效率。
{"title":"Adaptive Noise Injection against Side-Channel Attacks on ARM Platform","authors":"Naiwei Liu, Wanyu Zang, Songqing Chen, Meng Yu, R. Sandhu","doi":"10.4108/EAI.25-1-2019.159346","DOIUrl":"https://doi.org/10.4108/EAI.25-1-2019.159346","url":null,"abstract":"In recent years, research efforts have been made to develop safe and secure environments for ARM platform. The new ARMv8 architecture brought in security features by design. However, there are still some security problems with ARMv8. For example, on Cortex-A series, there are risks that the system is vulnerable to sidechannel attacks. One major category of side-channel attacks utilizes cache memory to obtain a victim’s secret information. In the cache based side-channel attacks, an attacker measures a sequence of cache operations to obtain a victim’s memory access information, deriving more sensitive information. The success of such attacks highly depends on accurate information about the victim’s cache accesses. In this paper, we describe an innovative approach to defend against side-channel attack on Cortex-A series chips. We also considered the side-channel attacks in the context of using TrustZone protection on ARM. Our adaptive noise injection can significantly reduce the bandwidth of side-channel while maintaining an affordable system overhead. The proposed defense mechanisms can be used on ARM Cortex-A architecture. Our experimental evaluation and theoretical analysis show the effectiveness and efficiency of our proposed defense.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132481089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy-Preserving Multi-Party Directory Services 保护隐私的多方目录服务
Pub Date : 2019-01-29 DOI: 10.4108/eai.29-7-2019.159627
Y. Tang, Kai Li, K. Areekijseree, Shuigeng Zhou, Liting Hu
In the era of big data, the data-processing pipeline becomes increasingly distributed among multiple sites. To connect data consumers with remote producers, a public directory service is essential. This is evidenced by adoption in emerging applications such as electronic healthcare. This work systematically studies the privacy-preserving and security hardening of a public directory service. First, we address the privacy preservation of serving a directory over the Internet. With Internet eavesdroppers performing attacks with background knowledge, the directory service has to be privacy preserving, for the compliance with data-protection laws (e.g., HiPAA). We propose techniques to adaptively inject noises to the public directory in such a way that is aware of application-level data schema, effectively preserving privacy and achieving high search recall. Second, we tackle the problem of securely constructing the directory among distrusting data producers. For provable security, we model the directory construction problem by secure multi-party computations (MPC). For efficiency, we propose a pre-computation framework that minimizes the private computation and conducts aggressive pre-computation on public data. In addition, we tackle the systems-level efficiency by exploiting data-level parallelism on general-purpose graphics processing units (GPGPU). We apply the proposed scheme to real health-care scenarios for constructing patient-locator services in emerging Health Information Exchange (or HIE) networks. For privacy evaluation, we conduct extensive analysis of our noise-injecting techniques against various background-knowledge attacks. We conduct experiments on real-world datasets and demonstrate the low attack success rate for the protection effectiveness. For performance evaluation, we implement our MPC optimization techniques on open-source MPC software. Through experiments on local and geo-distributed settings, our performance results show that the proposed pre-computation achieves a speedup of more than an order of magnitude without security loss. Received on 15 December 2018; accepted on 20 January 2019; published on 29 January 2019
在大数据时代,数据处理流水线越来越多地分布在多个站点。为了将数据消费者与远程生产者连接起来,公共目录服务是必不可少的。电子医疗保健等新兴应用程序的采用证明了这一点。本文系统地研究了公共目录服务的隐私保护和安全加固问题。首先,我们讨论在Internet上提供目录服务的隐私保护问题。由于互联网窃听者利用背景知识进行攻击,目录服务必须保持隐私,以遵守数据保护法(例如,HiPAA)。我们提出了一种能够感知应用级数据模式的自适应向公共目录注入噪声的技术,有效地保护了隐私并实现了高搜索召回率。其次,我们解决了在互不信任的数据生产者之间安全构建目录的问题。为了证明安全性,我们利用安全多方计算(MPC)对目录构建问题进行建模。为了提高效率,我们提出了一种预计算框架,该框架可以最大限度地减少私有计算,并对公共数据进行积极的预计算。此外,我们通过利用通用图形处理单元(GPGPU)上的数据级并行性来解决系统级效率问题。我们将提出的方案应用于真实的医疗保健场景,在新兴的健康信息交换(或HIE)网络中构建患者定位服务。为了进行隐私评估,我们对针对各种背景知识攻击的噪声注入技术进行了广泛的分析。我们在真实数据集上进行了实验,证明了低攻击成功率的保护效果。为了进行性能评估,我们在开源MPC软件上实现了我们的MPC优化技术。通过本地和地理分布设置的实验,我们的性能结果表明,我们提出的预计算在没有安全损失的情况下实现了超过一个数量级的加速。2018年12月15日收到;2019年1月20日接受;发布于2019年1月29日
{"title":"Privacy-Preserving Multi-Party Directory Services","authors":"Y. Tang, Kai Li, K. Areekijseree, Shuigeng Zhou, Liting Hu","doi":"10.4108/eai.29-7-2019.159627","DOIUrl":"https://doi.org/10.4108/eai.29-7-2019.159627","url":null,"abstract":"In the era of big data, the data-processing pipeline becomes increasingly distributed among multiple sites. To connect data consumers with remote producers, a public directory service is essential. This is evidenced by adoption in emerging applications such as electronic healthcare. This work systematically studies the privacy-preserving and security hardening of a public directory service. First, we address the privacy preservation of serving a directory over the Internet. With Internet eavesdroppers performing attacks with background knowledge, the directory service has to be privacy preserving, for the compliance with data-protection laws (e.g., HiPAA). We propose techniques to adaptively inject noises to the public directory in such a way that is aware of application-level data schema, effectively preserving privacy and achieving high search recall. Second, we tackle the problem of securely constructing the directory among distrusting data producers. For provable security, we model the directory construction problem by secure multi-party computations (MPC). For efficiency, we propose a pre-computation framework that minimizes the private computation and conducts aggressive pre-computation on public data. In addition, we tackle the systems-level efficiency by exploiting data-level parallelism on general-purpose graphics processing units (GPGPU). We apply the proposed scheme to real health-care scenarios for constructing patient-locator services in emerging Health Information Exchange (or HIE) networks. For privacy evaluation, we conduct extensive analysis of our noise-injecting techniques against various background-knowledge attacks. We conduct experiments on real-world datasets and demonstrate the low attack success rate for the protection effectiveness. For performance evaluation, we implement our MPC optimization techniques on open-source MPC software. Through experiments on local and geo-distributed settings, our performance results show that the proposed pre-computation achieves a speedup of more than an order of magnitude without security loss. Received on 15 December 2018; accepted on 20 January 2019; published on 29 January 2019","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116196664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
EAI Endorsed Trans. Security Safety
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1