首页 > 最新文献

EAI Endorsed Trans. Security Safety最新文献

英文 中文
Analysis of Targeted Mouse Movements for Gender Classification 目标鼠标运动的性别分类分析
Pub Date : 2017-12-07 DOI: 10.4108/eai.7-12-2017.153395
Nicolas Van Balen, C. Ball, Haining Wang
Gender is one of the essential characteristics of personal identity that is often misused by online impostors for malicious purposes. This paper proposes a naturalistic approach for identity protection with a specific focus on using mouse biometrics to ensure accurate gender identification. Our underpinning rationale lies in the fact that men and women differ in their natural aiming movements of a hand held object in twodimensional space due to anthropometric, biomechanical, and perceptual-motor control differences between the genders. Although some research has been done on classifying user by gender using biometrics, to the best of our knowledge, no research has provided a comprehensive list of which metrics (features) of movements are actually relevant to gender classification, or method by which these metrics may be chosen. This can lead to researchers making unguided decisions on which metrics to extract from the data, doing so for convenience or personal preference. Making choices this way can lead to negatively affecting the accuracy of the model by the inclusion of metrics with little relevance to the problem, and excluding metrics of high relevance. In this paper, we outline a method for choosing metrics based on empirical evidence of natural differences in the genders, and make recommendations on the choice of metrics. The efficacy of our method is then tested through the use of a logistic regression model. Received on 29 November 2017; accepted on 02 December 2017; published on 07 December 2017
性别是个人身份的基本特征之一,经常被网络冒名顶替者恶意利用。本文提出了一种自然的身份保护方法,特别关注使用小鼠生物特征来确保准确的性别识别。我们的基本原理是,由于人体测量学、生物力学和感知运动控制的性别差异,男性和女性在二维空间中手持物体的自然瞄准运动是不同的。虽然已经有一些使用生物识别技术对用户进行性别分类的研究,但据我们所知,还没有研究提供一个全面的列表,说明哪些动作指标(特征)实际上与性别分类有关,或者选择这些指标的方法。这可能导致研究人员出于方便或个人偏好,在从数据中提取哪些指标方面做出没有指导的决定。以这种方式做出选择可能会对模型的准确性产生负面影响,因为它包含了与问题无关的度量标准,并排除了高度相关的度量标准。在本文中,我们概述了一种基于性别自然差异的经验证据选择指标的方法,并就指标的选择提出了建议。然后通过使用逻辑回归模型来测试我们方法的有效性。2017年11月29日收到;2017年12月2日录用;发布于2017年12月7日
{"title":"Analysis of Targeted Mouse Movements for Gender Classification","authors":"Nicolas Van Balen, C. Ball, Haining Wang","doi":"10.4108/eai.7-12-2017.153395","DOIUrl":"https://doi.org/10.4108/eai.7-12-2017.153395","url":null,"abstract":"Gender is one of the essential characteristics of personal identity that is often misused by online impostors for malicious purposes. This paper proposes a naturalistic approach for identity protection with a specific focus on using mouse biometrics to ensure accurate gender identification. Our underpinning rationale lies in the fact that men and women differ in their natural aiming movements of a hand held object in twodimensional space due to anthropometric, biomechanical, and perceptual-motor control differences between the genders. Although some research has been done on classifying user by gender using biometrics, to the best of our knowledge, no research has provided a comprehensive list of which metrics (features) of movements are actually relevant to gender classification, or method by which these metrics may be chosen. This can lead to researchers making unguided decisions on which metrics to extract from the data, doing so for convenience or personal preference. Making choices this way can lead to negatively affecting the accuracy of the model by the inclusion of metrics with little relevance to the problem, and excluding metrics of high relevance. In this paper, we outline a method for choosing metrics based on empirical evidence of natural differences in the genders, and make recommendations on the choice of metrics. The efficacy of our method is then tested through the use of a logistic regression model. Received on 29 November 2017; accepted on 02 December 2017; published on 07 December 2017","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"333 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124697415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Re-identification of Vehicular Location-Based Metadata 基于车辆位置的元数据重新识别
Pub Date : 2017-12-07 DOI: 10.4108/EAI.7-12-2017.153393
Zheng Tan, Cheng Wang, Xiaoling Fu, Jipeng Cui, Changjun Jiang, Weili Han
{"title":"Re-identification of Vehicular Location-Based Metadata","authors":"Zheng Tan, Cheng Wang, Xiaoling Fu, Jipeng Cui, Changjun Jiang, Weili Han","doi":"10.4108/EAI.7-12-2017.153393","DOIUrl":"https://doi.org/10.4108/EAI.7-12-2017.153393","url":null,"abstract":"","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"9 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116393066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bootstrapping trust in software defined networks 在软件定义网络中引导信任
Pub Date : 2017-12-07 DOI: 10.4108/EAI.7-12-2017.153397
Nicolae Paladi, C. Gehrmann
Software-Defined Networking (SDN) is a novel architectural model for cloud network infrastructure, improving resource utilization, scalability and administration. SDN deployments increasingly rely on virtual switches executing on commodity operating systems with large code bases, which are prime targets for adversaries attacking the network infrastructure. We describe and implement TruSDN, a framework for bootstrapping trust in SDN infrastructure using Intel Software Guard Extensions (SGX), allowing to securely deploy SDN components and protect communication between network endpoints. We introduce ephemeral flow-specific preshared keys and propose a novel defense against cuckoo attacks on SGX enclaves. TruSDN is secure under a powerful adversary model, with a minor performance overhead. (Less)
软件定义网络(SDN)是云网络基础设施的一种新型体系结构模型,可提高资源利用率、可扩展性和管理能力。SDN部署越来越依赖于在具有大型代码库的商用操作系统上执行的虚拟交换机,这些操作系统是攻击网络基础设施的对手的主要目标。我们描述并实现了TruSDN,这是一个使用英特尔软件保护扩展(SGX)在SDN基础设施中引导信任的框架,允许安全部署SDN组件并保护网络端点之间的通信。我们引入了临时流特定的预共享密钥,并提出了一种针对SGX飞地布谷鸟攻击的新防御方法。在强大的对手模型下,TruSDN是安全的,性能开销很小。(少)
{"title":"Bootstrapping trust in software defined networks","authors":"Nicolae Paladi, C. Gehrmann","doi":"10.4108/EAI.7-12-2017.153397","DOIUrl":"https://doi.org/10.4108/EAI.7-12-2017.153397","url":null,"abstract":"Software-Defined Networking (SDN) is a novel architectural model for cloud network infrastructure, improving resource utilization, scalability and administration. SDN deployments increasingly rely on virtual switches executing on commodity operating systems with large code bases, which are prime targets for adversaries attacking the network infrastructure. We describe and implement TruSDN, a framework for bootstrapping trust in SDN infrastructure using Intel Software Guard Extensions (SGX), allowing to securely deploy SDN components and protect communication between network endpoints. We introduce ephemeral flow-specific preshared keys and propose a novel defense against cuckoo attacks on SGX enclaves. TruSDN is secure under a powerful adversary model, with a minor performance overhead. (Less)","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133633892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks DNS缓存投毒攻击的按需防御方案
Pub Date : 2017-10-22 DOI: 10.1007/978-3-319-78813-5_43
Zheng Wang, Shui Yu, S. Rose
{"title":"An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks","authors":"Zheng Wang, Shui Yu, S. Rose","doi":"10.1007/978-3-319-78813-5_43","DOIUrl":"https://doi.org/10.1007/978-3-319-78813-5_43","url":null,"abstract":"","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114543473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Identifying forensically uninteresting files in a large corpus 在大型语料库中识别法医上不感兴趣的文件
Pub Date : 2016-12-08 DOI: 10.4108/eai.8-12-2016.151725
N. Rowe
For digital forensics, eliminating the uninteresting is often more critical than finding the interesting since there is so much more of it. Published software-file hash values like those of the National Software Reference Library (NSRL) have limited scope. We discuss methods based on analysis of file context using the metadata of a large corpus. Tests were done with an international corpus of 262.7 million files obtained from 4018 drives. For malware investigations, we identify clues to malware in context, and show that using a Bayesian ranking formula on metadata can increase recall by 5.1 while increasing precision by 1.7 times over inspecting executables alone. For more general investigations, we show that using together two of nine criteria for uninteresting files, with exceptions for some special interesting files, can exclude 77.4% of our corpus instead of the 23.8% that were excluded by NSRL. For a test set of 19,784 randomly selected files from our corpus that were manually inspected, false positives after file exclusion (interesting files identified as uninteresting) were 0.18% and false negatives (uninteresting files identified as interesting) were 29.31% using our methods. The generality of the methods was confirmed by separately testing two halves of our corpus. Few of our excluded files were matched in two commercial hash sets. This work provides both new uninteresting hash values and programs for finding more.
对于数字取证来说,消除无趣的信息往往比发现有趣的信息更重要,因为有太多有趣的信息了。发布的软件文件散列值,如国家软件参考图书馆(NSRL)的散列值,范围有限。我们讨论了基于使用大型语料库的元数据分析文件上下文的方法。测试使用了从4018个驱动器获得的2.627亿个文件的国际语料库。对于恶意软件调查,我们在上下文中识别恶意软件的线索,并表明在元数据上使用贝叶斯排序公式可以将召回率提高5.1倍,同时将精度提高1.7倍。对于更一般的调查,我们表明,除了一些特别有趣的文件之外,将9个标准中的2个一起使用,可以排除77.4%的语料库,而不是NSRL排除的23.8%。对于从语料库中随机选择的19,784个文件进行手动检查的测试集,使用我们的方法,文件排除后的假阳性(将感兴趣的文件识别为无兴趣的)为0.18%,假阴性(将无兴趣的文件识别为感兴趣的)为29.31%。通过对语料库的两部分分别进行测试,证实了方法的通用性。我们排除的文件很少在两个商业哈希集中匹配。这项工作既提供了新的无趣的哈希值,也提供了查找更多哈希值的程序。
{"title":"Identifying forensically uninteresting files in a large corpus","authors":"N. Rowe","doi":"10.4108/eai.8-12-2016.151725","DOIUrl":"https://doi.org/10.4108/eai.8-12-2016.151725","url":null,"abstract":"For digital forensics, eliminating the uninteresting is often more critical than finding the interesting since there is so much more of it. Published software-file hash values like those of the National Software Reference Library (NSRL) have limited scope. We discuss methods based on analysis of file context using the metadata of a large corpus. Tests were done with an international corpus of 262.7 million files obtained from 4018 drives. For malware investigations, we identify clues to malware in context, and show that using a Bayesian ranking formula on metadata can increase recall by 5.1 while increasing precision by 1.7 times over inspecting executables alone. For more general investigations, we show that using together two of nine criteria for uninteresting files, with exceptions for some special interesting files, can exclude 77.4% of our corpus instead of the 23.8% that were excluded by NSRL. For a test set of 19,784 randomly selected files from our corpus that were manually inspected, false positives after file exclusion (interesting files identified as uninteresting) were 0.18% and false negatives (uninteresting files identified as interesting) were 29.31% using our methods. The generality of the methods was confirmed by separately testing two halves of our corpus. Few of our excluded files were matched in two commercial hash sets. This work provides both new uninteresting hash values and programs for finding more.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130305831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Sctivities B2C电子商务中的犯罪预防:电子零售商/银行如何防范犯罪活动
Pub Date : 2016-12-08 DOI: 10.4108/eai.8-12-2016.151727
Najlaa Almajed, L. Maglaras, F. Siewe, H. Janicke, P. B. Zadeh
{"title":"Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Sctivities","authors":"Najlaa Almajed, L. Maglaras, F. Siewe, H. Janicke, P. B. Zadeh","doi":"10.4108/eai.8-12-2016.151727","DOIUrl":"https://doi.org/10.4108/eai.8-12-2016.151727","url":null,"abstract":"","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116268603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security, Privacy and Trust in Cyber Physical Systems 网络物理系统中的安全、隐私和信任
Pub Date : 2016-12-08 DOI: 10.4108/eai.8-12-2016.151724
H. Janicke, Kevin I. Jones, L. Maglaras
The first issue of the third volume of the EAI transactions on Security and Safety provides an insight to methods and techniques that improve security, safety and privacy of benchmark systems. Actually, two main classes of research results are considered. The first one is on attack prevention and secure planning while the second one is focused on forensics analysis. In particular, in the area of attack preventions and secure planning the issue presents (i) a new model and an algorithm to estimate and generate a network path identified by flow performance indicators of a heterogeneous communication network, (ii) suitable procedures that e-commerce operators may apply to minimize the risk of criminal activities, and (iii) a novel pseudorandom number generator family, called filtering nonlinear feedback shift register for RFID tags. In the area of forensic research the issue presents new findings on new methods exploiting the metadata of a large corpus.
EAI关于安全和安全事务的第三卷的第一期提供了对改进基准系统的安全性、安全性和隐私性的方法和技术的见解。实际上,研究结果主要分为两类。第一个是攻击预防和安全规划,第二个是取证分析。特别是,在攻击预防和安全规划领域,该问题提出了(i)一种新的模型和算法来估计和生成由异构通信网络的流量性能指标识别的网络路径,(ii)电子商务运营商可以应用的适当程序,以尽量减少犯罪活动的风险,以及(iii)一种新的伪随机数生成器系列,称为RFID标签的滤波非线性反馈移位寄存器。在法医研究领域,该问题提出了利用大型语料库元数据的新方法的新发现。
{"title":"Security, Privacy and Trust in Cyber Physical Systems","authors":"H. Janicke, Kevin I. Jones, L. Maglaras","doi":"10.4108/eai.8-12-2016.151724","DOIUrl":"https://doi.org/10.4108/eai.8-12-2016.151724","url":null,"abstract":"The first issue of the third volume of the EAI transactions on Security and Safety provides an insight to methods and techniques that improve security, safety and privacy of benchmark systems. Actually, two main classes of research results are considered. The first one is on attack prevention and secure planning while the second one is focused on forensics analysis. In particular, in the area of attack preventions and secure planning the issue presents (i) a new model and an algorithm to estimate and generate a network path identified by flow performance indicators of a heterogeneous communication network, (ii) suitable procedures that e-commerce operators may apply to minimize the risk of criminal activities, and (iii) a novel pseudorandom number generator family, called filtering nonlinear feedback shift register for RFID tags. In the area of forensic research the issue presents new findings on new methods exploiting the metadata of a large corpus.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116661895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications 使用Welch-Gong变换滤波非线性反馈移位寄存器以保护RFID应用
Pub Date : 2016-12-08 DOI: 10.4108/eai.8-12-2016.151726
K. Mandal, G. Gong
Pseudorandom number generators play an important role to provide security and privacy on radio frequency identification (RFID) tags. In particular, the EPC Class 1 Generation 2 (EPC C1 Gen2) standard uses a pseudorandom number generator in the tag identification protocol. In this paper, we first present a pseudorandom number generator, named the filtering nonlinear feedback shift register using Welch-Gong (WG) transformations (filtering WG-NLFSR) and the filtering WG7-NLFSR for EPC C1 Gen2 RFID tags. We then investigate the periodicity of a sequence generated by the filtering WG-NLFSR by considering the model, named nonlinear feedback shift registers using Welch-Gong (WG) transformations (WG-NLFSR). The periodicity of WG-NLFSR sequences is investigated in two ways. Firstly, we perform the cycle decomposition of WG-NLFSR recurrence relations over different finite fields by computer simulations where the nonlinear recurrence relation is composed of a characteristic polynomial and a WG transformation module. Secondly, we conduct an empirical study on the period distribution of the sequences generated by the WG-NLFSR. The empirical study states that a sequence with period bounded below by the square root of the maximum period can be generated by the WG-NLFSR with high probability for any initial state.
伪随机数生成器在射频识别(RFID)标签的安全性和保密性方面发挥着重要作用。特别是,EPC Class 1 Generation 2 (EPC C1 Gen2)标准在标签识别协议中使用了伪随机数生成器。在本文中,我们首先提出了一种伪随机数发生器,命名为滤波非线性反馈移位寄存器,使用Welch-Gong (WG)变换(滤波WG- nlfsr)和滤波WG7-NLFSR用于EPC C1 Gen2 RFID标签。然后,我们通过考虑使用Welch-Gong (WG)变换(WG- nlfsr)的非线性反馈移位寄存器模型(WG- nlfsr)来研究由滤波WG- nlfsr生成的序列的周期性。用两种方法研究了WG-NLFSR序列的周期性。首先,通过计算机模拟对不同有限域上的WG- nlfsr递归关系进行循环分解,其中非线性递归关系由特征多项式和WG变换模块组成。其次,我们对WG-NLFSR生成的序列周期分布进行了实证研究。实证研究表明,对于任何初始状态,WG-NLFSR都可以高概率地生成周期为最大周期平方根的序列。
{"title":"Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications","authors":"K. Mandal, G. Gong","doi":"10.4108/eai.8-12-2016.151726","DOIUrl":"https://doi.org/10.4108/eai.8-12-2016.151726","url":null,"abstract":"Pseudorandom number generators play an important role to provide security and privacy on radio frequency identification (RFID) tags. In particular, the EPC Class 1 Generation 2 (EPC C1 Gen2) standard uses a pseudorandom number generator in the tag identification protocol. In this paper, we first present a pseudorandom number generator, named the filtering nonlinear feedback shift register using Welch-Gong (WG) transformations (filtering WG-NLFSR) and the filtering WG7-NLFSR for EPC C1 Gen2 RFID tags. We then investigate the periodicity of a sequence generated by the filtering WG-NLFSR by considering the model, named nonlinear feedback shift registers using Welch-Gong (WG) transformations (WG-NLFSR). The periodicity of WG-NLFSR sequences is investigated in two ways. Firstly, we perform the cycle decomposition of WG-NLFSR recurrence relations over different finite fields by computer simulations where the nonlinear recurrence relation is composed of a characteristic polynomial and a WG transformation module. Secondly, we conduct an empirical study on the period distribution of the sequences generated by the WG-NLFSR. The empirical study states that a sequence with period bounded below by the square root of the maximum period can be generated by the WG-NLFSR with high probability for any initial state.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128056788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Assessing Security, Capacity and Reachability of a Heterogeneous Industrial Network during Planning Phase 规划阶段异构工业网络的安全性、容量和可达性评估
Pub Date : 2016-12-08 DOI: 10.4108/eai.8-12-2016.151728
Apala Ray, J. Åkerberg, M. Björkman, M. Gidlund
In an industrial plant, there is usually a mix of devices with different levels of security features and computation capabilities. If a mix of devices with various degrees of security features and ...
在工业工厂中,通常会混合使用具有不同级别安全特性和计算能力的设备。如果混合设备具有不同程度的安全功能和…
{"title":"Assessing Security, Capacity and Reachability of a Heterogeneous Industrial Network during Planning Phase","authors":"Apala Ray, J. Åkerberg, M. Björkman, M. Gidlund","doi":"10.4108/eai.8-12-2016.151728","DOIUrl":"https://doi.org/10.4108/eai.8-12-2016.151728","url":null,"abstract":"In an industrial plant, there is usually a mix of devices with different levels of security features and computation capabilities. If a mix of devices with various degrees of security features and ...","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131590506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN) 基于深度学习的软件定义网络(SDN) DDoS检测系统
Pub Date : 2016-11-22 DOI: 10.4108/eai.28-12-2017.153515
Quamar Niyaz, Weiqing Sun, A. Javaid
Distributed Denial of Service (DDoS) is one of the most prevalent attacks that an organizational network infrastructure comes across nowadays. We propose a deep learning based multi-vector DDoS detection system in a software-defined network (SDN) environment. SDN provides flexibility to program network devices for different objectives and eliminates the need for third-party vendor-specific hardware. We implement our system as a network application on top of an SDN controller. We use deep learning for feature reduction of a large set of features derived from network traffic headers. We evaluate our system based on different performance metrics by applying it on traffic traces collected from different scenarios. We observe high accuracy with a low false-positive for attack detection in our proposed system.
分布式拒绝服务(DDoS)是当今组织网络基础设施遇到的最普遍的攻击之一。我们提出了一种基于深度学习的软件定义网络(SDN)环境下的多向量DDoS检测系统。SDN提供了为不同目标编程网络设备的灵活性,并且消除了对第三方供应商特定硬件的需求。我们将系统作为SDN控制器之上的网络应用程序来实现。我们使用深度学习对来自网络流量报头的大量特征进行特征约简。我们根据不同的性能指标评估我们的系统,将其应用于从不同场景收集的流量轨迹。在我们提出的系统中,我们观察到攻击检测的高准确性和低假阳性。
{"title":"A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN)","authors":"Quamar Niyaz, Weiqing Sun, A. Javaid","doi":"10.4108/eai.28-12-2017.153515","DOIUrl":"https://doi.org/10.4108/eai.28-12-2017.153515","url":null,"abstract":"Distributed Denial of Service (DDoS) is one of the most prevalent attacks that an organizational network infrastructure comes across nowadays. We propose a deep learning based multi-vector DDoS detection system in a software-defined network (SDN) environment. SDN provides flexibility to program network devices for different objectives and eliminates the need for third-party vendor-specific hardware. We implement our system as a network application on top of an SDN controller. We use deep learning for feature reduction of a large set of features derived from network traffic headers. We evaluate our system based on different performance metrics by applying it on traffic traces collected from different scenarios. We observe high accuracy with a low false-positive for attack detection in our proposed system.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132425790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 241
期刊
EAI Endorsed Trans. Security Safety
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1