首页 > 最新文献

Proceedings of the 2020 10th International Conference on Communication and Network Security最新文献

英文 中文
A Privacy-Preserving Framework for Surveillance Systems 监控系统的隐私保护框架
Kok-Seng Wong, Nguyen Anh Tu, Anuar Maratkhan, M. Demirci
The ability to visually track people present in the scene is essential for any surveillance system. However, the widespread deployment and increased advancement of video surveillance systems have raised awareness of privacy to the public, i.e., human identity in the videos. The existing indoor surveillance systems allow people to be watched remotely and recorded continuously but do not prevent any party from viewing activities and collecting personal visual information of people in the videos. Because of this problem, we propose a privacy-preserving framework to provide each user (e.g., parents) with a personalized video where the user see only selected target subjects (e.g., child, teacher, and intruder) while other faces are dynamically masked. The primary services in our framework consist of a video streaming service and a personalized service. The video streaming service is responsible for detecting, segmenting, recognizing, and masking face images of the human subjects in the video. Notably, it classifies human subjects into insider and outsider classes and then applies the de-identification (i.e., masking) to those in the insider class, including the target subjects. Subsequently, the personalized service receives the visual information (i.e., masked and unmasked faces) from the streaming service and processes it at the user's mobile device. The output is then a personalized video for each user. For security reasons, we require the surveillance videos stored in the cloud in an encrypted form. To ensure an individual remains anonymous in a group, we propose a dynamic masking approach to mask the human subjects in the video. Our framework can deliver both reliable visual privacy protection and video utility. For instance, users can have confidence that their target subjects are anonymized in other views. To utilize the personalized video, users can use analytics software installed on their mobile devices to analyze the activities of their target subjects.
视觉跟踪现场人员的能力对于任何监控系统都是必不可少的。然而,视频监控系统的广泛部署和进步提高了公众的隐私意识,即视频中的人的身份。现有的室内监控系统允许远程监视和连续记录人员,但不阻止任何一方观看视频中人员的活动和收集个人视觉信息。由于这个问题,我们提出了一个隐私保护框架,为每个用户(例如父母)提供个性化的视频,其中用户只看到选定的目标主体(例如儿童,教师和入侵者),而其他面孔被动态屏蔽。我们框架中的主要服务包括视频流服务和个性化服务。视频流服务负责检测、分割、识别和屏蔽视频中人类受试者的面部图像。值得注意的是,它将人类受试者分为内部和外部类别,然后对内部类别中的人(包括目标受试者)应用去识别(即屏蔽)。随后,个性化服务接收来自流媒体服务的视觉信息(即,蒙面和未蒙面的面孔),并在用户的移动设备上进行处理。然后输出的是每个用户的个性化视频。出于安全考虑,我们要求将监控视频以加密形式存储在云端。为了确保个人在群体中保持匿名,我们提出了一种动态屏蔽方法来屏蔽视频中的人类受试者。我们的框架可以提供可靠的视觉隐私保护和视频实用。例如,用户可以确信他们的目标对象在其他视图中是匿名的。为了利用个性化视频,用户可以使用安装在移动设备上的分析软件来分析目标对象的活动。
{"title":"A Privacy-Preserving Framework for Surveillance Systems","authors":"Kok-Seng Wong, Nguyen Anh Tu, Anuar Maratkhan, M. Demirci","doi":"10.1145/3442520.3442524","DOIUrl":"https://doi.org/10.1145/3442520.3442524","url":null,"abstract":"The ability to visually track people present in the scene is essential for any surveillance system. However, the widespread deployment and increased advancement of video surveillance systems have raised awareness of privacy to the public, i.e., human identity in the videos. The existing indoor surveillance systems allow people to be watched remotely and recorded continuously but do not prevent any party from viewing activities and collecting personal visual information of people in the videos. Because of this problem, we propose a privacy-preserving framework to provide each user (e.g., parents) with a personalized video where the user see only selected target subjects (e.g., child, teacher, and intruder) while other faces are dynamically masked. The primary services in our framework consist of a video streaming service and a personalized service. The video streaming service is responsible for detecting, segmenting, recognizing, and masking face images of the human subjects in the video. Notably, it classifies human subjects into insider and outsider classes and then applies the de-identification (i.e., masking) to those in the insider class, including the target subjects. Subsequently, the personalized service receives the visual information (i.e., masked and unmasked faces) from the streaming service and processes it at the user's mobile device. The output is then a personalized video for each user. For security reasons, we require the surveillance videos stored in the cloud in an encrypted form. To ensure an individual remains anonymous in a group, we propose a dynamic masking approach to mask the human subjects in the video. Our framework can deliver both reliable visual privacy protection and video utility. For instance, users can have confidence that their target subjects are anonymized in other views. To utilize the personalized video, users can use analytics software installed on their mobile devices to analyze the activities of their target subjects.","PeriodicalId":340416,"journal":{"name":"Proceedings of the 2020 10th International Conference on Communication and Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126307848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards Unsupervised Introspection of Containerized Application 容器化应用的无监督自省
Pinchen Cui, D. Umphress
Container (or containerization) as one of the new concepts of virtualization, has attracted increasing attention and occupied a considerable amount of market size owing to the inherent lightweight characteristic. However, the lightweight advantage is achieved at the price of the security. Attacks against weak isolation of the container have been reported, and the use of a shared kernel is another targeted vulnerable point. This work aims to provide secure monitoring of containerized applications, which can help i) the infrastructure owner to ensure the running application is harmless, ii) the application owner to detect anomalous behaviors. We propose to use unsupervised introspection tools to perform the non-intrusive monitoring, which leverages the system call traces to classify the anomalies. Since the traditional dataset used for anomaly detection either only focus on network traces or limited to few attributes of system calls, we crafted and collected various normal and abnormal behaviors of a containerized application, and an optimized and open-source system call based dataset has been built. Unsupervised machine learning classifiers are trained over the proposed dataset, a comprehensive case study has been performed and analyzed. The results show the feasibility of unsupervised introspection of containerized applications.
容器(或容器化)作为虚拟化的新概念之一,由于其固有的轻量级特性,引起了越来越多的关注,并占据了相当大的市场规模。然而,轻量级的优势是以牺牲安全性为代价来实现的。已经报告了针对容器弱隔离的攻击,而共享内核的使用是另一个目标弱点。这项工作旨在提供对容器化应用程序的安全监控,这可以帮助i)基础设施所有者确保运行的应用程序是无害的,ii)应用程序所有者检测异常行为。我们建议使用无监督自省工具来执行非侵入式监视,它利用系统调用跟踪来对异常进行分类。针对传统用于异常检测的数据集只关注网络轨迹或限于系统调用的少数属性的问题,我们对容器化应用的各种正常和异常行为进行了精心制作和收集,构建了一个优化的、开源的基于系统调用的数据集。在提出的数据集上训练无监督机器学习分类器,并进行了全面的案例研究和分析。结果表明,容器化应用的无监督自省是可行的。
{"title":"Towards Unsupervised Introspection of Containerized Application","authors":"Pinchen Cui, D. Umphress","doi":"10.1145/3442520.3442530","DOIUrl":"https://doi.org/10.1145/3442520.3442530","url":null,"abstract":"Container (or containerization) as one of the new concepts of virtualization, has attracted increasing attention and occupied a considerable amount of market size owing to the inherent lightweight characteristic. However, the lightweight advantage is achieved at the price of the security. Attacks against weak isolation of the container have been reported, and the use of a shared kernel is another targeted vulnerable point. This work aims to provide secure monitoring of containerized applications, which can help i) the infrastructure owner to ensure the running application is harmless, ii) the application owner to detect anomalous behaviors. We propose to use unsupervised introspection tools to perform the non-intrusive monitoring, which leverages the system call traces to classify the anomalies. Since the traditional dataset used for anomaly detection either only focus on network traces or limited to few attributes of system calls, we crafted and collected various normal and abnormal behaviors of a containerized application, and an optimized and open-source system call based dataset has been built. Unsupervised machine learning classifiers are trained over the proposed dataset, a comprehensive case study has been performed and analyzed. The results show the feasibility of unsupervised introspection of containerized applications.","PeriodicalId":340416,"journal":{"name":"Proceedings of the 2020 10th International Conference on Communication and Network Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131891164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Identification of Spoofed Emails by applying Email Forensics and Memory Forensics 利用电子邮件取证和内存取证识别欺骗邮件
Sanjeev Shukla, M. Misra, G. Varshney
Email forensics is the subdomain of network forensics, and email spoofing is the most common type of email attack. Email spoofing is a process of creating a forged message by manipulating the sender’s email address so that it appears to the recipient that the originating email is coming from a genuine sender. Spoofed email attack and its detection is a challenging problem in email forensic investigation. Research in the past has tried to address email detection by different mechanisms. This paper tries to improve and fill some of the research gaps from the base paper of R.P Iyer [11]. In our work, we detect spoofed emails received by the user by applying memory forensic approach. Instead of capturing the complete memory dump, we only capture the browser’s live running processes from memory and extract the email header for analysis. This reduces the size of the memory dump and makes detection fast. Also proposed detection algorithm overcomes messageID based detection failures by applying nslookup to fetch MX record to identify the genuine emails. The advantage of memory forensic application for spoofed email detection is that we get guaranteed non-repudiation of the user’s digital footprint in physical memory. The results of the performance analysis show that the entire task can be completed in approximately 1 min with high accuracy with minimum false positives. The proposed method detects spoofed emails without disrupting the regular operation of the testing machine.
电子邮件取证是网络取证的子领域,电子邮件欺骗是最常见的电子邮件攻击类型。电子邮件欺骗是通过操纵发件人的电子邮件地址来创建伪造信息的过程,以便在收件人看来,原始电子邮件来自真正的发件人。欺骗邮件攻击及其检测是电子邮件取证调查中的一个难题。过去的研究试图通过不同的机制来解决电子邮件检测问题。本文试图完善和填补R.P Iyer[11]基础论文的部分研究空白。在我们的工作中,我们通过应用内存取证方法检测用户收到的欺骗电子邮件。我们没有捕获完整的内存转储,而是从内存中捕获浏览器正在运行的进程,并提取电子邮件头以供分析。这减少了内存转储的大小,使检测更快。提出的检测算法克服了基于messageID的检测失败,通过nslookup获取MX记录来识别真实的电子邮件。内存取证应用程序用于欺骗电子邮件检测的优点是,我们可以保证用户在物理内存中的数字足迹不可否认。性能分析结果表明,整个任务可以在大约1分钟内完成,准确率高,假阳性最小。所提出的方法在不干扰试验机正常运行的情况下检测欺骗电子邮件。
{"title":"Identification of Spoofed Emails by applying Email Forensics and Memory Forensics","authors":"Sanjeev Shukla, M. Misra, G. Varshney","doi":"10.1145/3442520.3442527","DOIUrl":"https://doi.org/10.1145/3442520.3442527","url":null,"abstract":"Email forensics is the subdomain of network forensics, and email spoofing is the most common type of email attack. Email spoofing is a process of creating a forged message by manipulating the sender’s email address so that it appears to the recipient that the originating email is coming from a genuine sender. Spoofed email attack and its detection is a challenging problem in email forensic investigation. Research in the past has tried to address email detection by different mechanisms. This paper tries to improve and fill some of the research gaps from the base paper of R.P Iyer [11]. In our work, we detect spoofed emails received by the user by applying memory forensic approach. Instead of capturing the complete memory dump, we only capture the browser’s live running processes from memory and extract the email header for analysis. This reduces the size of the memory dump and makes detection fast. Also proposed detection algorithm overcomes messageID based detection failures by applying nslookup to fetch MX record to identify the genuine emails. The advantage of memory forensic application for spoofed email detection is that we get guaranteed non-repudiation of the user’s digital footprint in physical memory. The results of the performance analysis show that the entire task can be completed in approximately 1 min with high accuracy with minimum false positives. The proposed method detects spoofed emails without disrupting the regular operation of the testing machine.","PeriodicalId":340416,"journal":{"name":"Proceedings of the 2020 10th International Conference on Communication and Network Security","volume":"459 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116770297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the predictability of biometric honey templates, based on Bayesian inference 基于贝叶斯推理的生物特征蜂蜜模板可预测性研究
Edlira Martiri, Bian Yang
In high level security environments, data protection and leakage prevention remains one of the main challenges. In biometric systems, its most sensitive piece of information, the template, is constantly being exchanged between its building blocks. instead of having one template, in this paper we generate a set of synthetic templates to camouflage the genuine one. To test their indistinguishability, we suppose an attack and compare two different classifications results of reconstructed faces: humans and SVM classifier. For the former, we built a platform where testers could classify a set of random preimages reconstructed from real or synthetic (honey) templates. From an attacker point of view, we noticed that, compared to the SVM classifier, human testers showed better results in terms of classification distinguishability.
在高级别安全环境中,数据保护和防止泄漏仍然是主要挑战之一。在生物识别系统中,最敏感的信息——模板——在构建模块之间不断交换。在本文中,我们生成了一组合成模板来伪装真实模板,而不是只有一个模板。为了测试它们的不可区分性,我们假设了一种攻击,并比较了两种不同的重建人脸分类结果:人类和SVM分类器。对于前者,我们构建了一个平台,测试人员可以在其中对一组从真实或合成(蜂蜜)模板重建的随机预图像进行分类。从攻击者的角度来看,我们注意到,与SVM分类器相比,人类测试人员在分类可分辨性方面表现出更好的结果。
{"title":"On the predictability of biometric honey templates, based on Bayesian inference","authors":"Edlira Martiri, Bian Yang","doi":"10.1145/3442520.3442532","DOIUrl":"https://doi.org/10.1145/3442520.3442532","url":null,"abstract":"In high level security environments, data protection and leakage prevention remains one of the main challenges. In biometric systems, its most sensitive piece of information, the template, is constantly being exchanged between its building blocks. instead of having one template, in this paper we generate a set of synthetic templates to camouflage the genuine one. To test their indistinguishability, we suppose an attack and compare two different classifications results of reconstructed faces: humans and SVM classifier. For the former, we built a platform where testers could classify a set of random preimages reconstructed from real or synthetic (honey) templates. From an attacker point of view, we noticed that, compared to the SVM classifier, human testers showed better results in terms of classification distinguishability.","PeriodicalId":340416,"journal":{"name":"Proceedings of the 2020 10th International Conference on Communication and Network Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128871087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VCPEC: Vulnerability Correlation Analysis Based on Privilege Escalation and Coritivity Theory VCPEC:基于特权升级和主动性理论的漏洞相关性分析
Xuefei Wang, Rui Ma, Donghai Tian, Xiajing Wang
Vulnerability correlation analysis has become a key technique in the field of vulnerability analysis, which effectively addresses the limitation of only analyzing an isolated vulnerability. Even though the existing techniques have demonstrated their effectiveness in assessing the complex relationship between the vulnerabilities, they remain limited in accurately locating critical vulnerabilities. To overcome this issue, we design a vulnerability correlation analysis method, named VCPEC, to discover critical vulnerabilities using extended coritivity theory towards a novel privilege model. The key idea is to construct a vulnerability correlation graph (VCG) according to the system privilege grading strategy and the vulnerability privilege escalation paths, reducing the complexity in the graph. Then use the extended coritivity theory to calculate the core of the VCG, that means the critical vulnerabilities can be further recognized. Thus, by repairing critical vulnerabilities to achieve efficient protection of target system, saving the cost of repairing vulnerabilities. We design and perform experiments to verify the feasibility and efficiency of VCPEC in real-world software systems. And the results show that VCPEC can accurately locate critical vulnerabilities.
漏洞相关分析技术有效地解决了以往仅对孤立漏洞进行分析的局限性,已成为漏洞分析领域的一项关键技术。尽管现有的技术在评估漏洞之间的复杂关系方面已经证明了它们的有效性,但它们在准确定位关键漏洞方面仍然有限。为了克服这一问题,我们设计了一种名为VCPEC的漏洞关联分析方法,利用扩展的主动性理论来发现新的特权模型中的关键漏洞。其核心思想是根据系统权限分级策略和漏洞权限升级路径构建漏洞关联图,降低图的复杂度。然后利用扩展活动度理论计算出VCG的核心,从而进一步识别出关键漏洞。因此,通过修复关键漏洞来实现对目标系统的有效保护,节省修复漏洞的成本。我们设计并进行了实验,以验证VCPEC在实际软件系统中的可行性和效率。结果表明,VCPEC能够准确定位关键漏洞。
{"title":"VCPEC: Vulnerability Correlation Analysis Based on Privilege Escalation and Coritivity Theory","authors":"Xuefei Wang, Rui Ma, Donghai Tian, Xiajing Wang","doi":"10.1145/3442520.3442526","DOIUrl":"https://doi.org/10.1145/3442520.3442526","url":null,"abstract":"Vulnerability correlation analysis has become a key technique in the field of vulnerability analysis, which effectively addresses the limitation of only analyzing an isolated vulnerability. Even though the existing techniques have demonstrated their effectiveness in assessing the complex relationship between the vulnerabilities, they remain limited in accurately locating critical vulnerabilities. To overcome this issue, we design a vulnerability correlation analysis method, named VCPEC, to discover critical vulnerabilities using extended coritivity theory towards a novel privilege model. The key idea is to construct a vulnerability correlation graph (VCG) according to the system privilege grading strategy and the vulnerability privilege escalation paths, reducing the complexity in the graph. Then use the extended coritivity theory to calculate the core of the VCG, that means the critical vulnerabilities can be further recognized. Thus, by repairing critical vulnerabilities to achieve efficient protection of target system, saving the cost of repairing vulnerabilities. We design and perform experiments to verify the feasibility and efficiency of VCPEC in real-world software systems. And the results show that VCPEC can accurately locate critical vulnerabilities.","PeriodicalId":340416,"journal":{"name":"Proceedings of the 2020 10th International Conference on Communication and Network Security","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114257533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 2020 10th International Conference on Communication and Network Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1