首页 > 最新文献

IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.最新文献

英文 中文
Countermeasures in curbing gambling activities on the Internet in Taiwan 台湾遏止网路赌博活动之对策
Shiuh-Jeng Wang, Hung-Jui Ke
The gambling activity is prohibited in Taiwan although it exists in the society for a long time. With the Internet emergence in the recent decade, not only is the e-commerce promoted, but also Internet gambling is posed accordingly. The negative influence of Internet gambling, however, is much more than the traditional gambling impacting on our society. Due to the properties of anonymity, no boundary, and fast propagation on Internet world, it is more difficult for the law enforcement members to seize the suspects who engage in the illegal gambling behavior. We introduce some serious problems resulted in Internet gambling. In response to the Internet gambling problems, we advise a procedure of investigation to curb the spread of Internet bet in Taiwan. According to our proposal, the information of collected evidence is believed that it can be powerfully presented in the judicial court. The suspects who attempt on the bet of Internet are supposed to be deterred in such activity.
虽然赌博活动在社会上存在了很长时间,但在台湾是被禁止的。近十年来,随着互联网的兴起,不仅电子商务得到了推广,网络赌博也随之兴起。然而,网络赌博的负面影响远远超过传统赌博对我们社会的影响。由于网络赌博具有匿名性、无边界性和在网络世界快速传播的特点,使得执法人员对从事非法赌博行为的犯罪嫌疑人的抓捕难度加大。本文介绍了网络赌博带来的一些严重问题。针对网路赌博的问题,我们建议采取调查程序,以遏止网路赌博在台湾的蔓延。根据我们的建议,我们认为收集到的证据信息可以在司法法庭上有力地提出。试图在网络上赌博的嫌疑人应该在这种活动中被阻止。
{"title":"Countermeasures in curbing gambling activities on the Internet in Taiwan","authors":"Shiuh-Jeng Wang, Hung-Jui Ke","doi":"10.1109/CCST.2003.1297585","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297585","url":null,"abstract":"The gambling activity is prohibited in Taiwan although it exists in the society for a long time. With the Internet emergence in the recent decade, not only is the e-commerce promoted, but also Internet gambling is posed accordingly. The negative influence of Internet gambling, however, is much more than the traditional gambling impacting on our society. Due to the properties of anonymity, no boundary, and fast propagation on Internet world, it is more difficult for the law enforcement members to seize the suspects who engage in the illegal gambling behavior. We introduce some serious problems resulted in Internet gambling. In response to the Internet gambling problems, we advise a procedure of investigation to curb the spread of Internet bet in Taiwan. According to our proposal, the information of collected evidence is believed that it can be powerfully presented in the judicial court. The suspects who attempt on the bet of Internet are supposed to be deterred in such activity.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129996871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast implementation of AES cryptographic algorithms in smart cards 智能卡中AES加密算法的快速实现
Chi-Feng Lu, Yan-Shun Kao, Hsia-Ling Chiang, Chung-Huang Yang
The National Institute of Standards and Technology (NIST) of US announced Rijndael algorithm as the advanced encryption standard (AES) in October 2000, Despite AES surpassing in security the data encryption standard (DES), it is still rare to be implemented in smart cards, due to the reason of deficient AES coprocessors. Here a chip operation system (COS) called NexCard, which derived from Microsoft's Windows COS, is used as the AES implementation platform. After a suitable COS architecture design for AES and methodology of efficient memory usage, the simulation result shows that direct embedding AES encryption attains 0.56 ms at system clock 15 MHz on the INFINEON SLE66CX322P chip without existence of coprocessor. Corresponding to the development needs in smart card cryptographic algorithm implementations, and different level of the security design specifications, a concept to conjoin numbers of algorithms into single smart card called cipher system on demand (CSOD) method is accomplished in this study concurrently. This is a method utilizing the multiapplication capability of NexCard v2.0 to execute the same AES algorithm as an on-card applet. Although the performance of CSOD is not as good as AES embedded method, CSOD can provide the same result in the situation of adaptability and extendibility.
2000年10月,美国国家标准与技术研究院(NIST)宣布Rijndael算法为高级加密标准(AES),尽管AES在安全性上超过了数据加密标准(DES),但由于AES协处理器的不足,在智能卡中很少实施。AES的实现平台是由微软的Windows COS衍生而来的芯片操作系统NexCard (chip operating system)。仿真结果表明,在INFINEON SLE66CX322P芯片上,在不存在协处理器的情况下,直接嵌入AES加密在系统时钟15 MHz时达到0.56 ms。针对智能卡加密算法实现的发展需要,以及不同层次的安全设计规范,本文提出了一种将多个算法合并到一张智能卡中的概念,即按需密码系统(cipher system on demand, CSOD)方法。这是一种利用NexCard v2.0的多应用程序功能来执行与卡上小程序相同的AES算法的方法。虽然CSOD的性能不如AES嵌入式方法,但在适应性和可扩展性的情况下,CSOD可以提供相同的结果。
{"title":"Fast implementation of AES cryptographic algorithms in smart cards","authors":"Chi-Feng Lu, Yan-Shun Kao, Hsia-Ling Chiang, Chung-Huang Yang","doi":"10.1109/CCST.2003.1297622","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297622","url":null,"abstract":"The National Institute of Standards and Technology (NIST) of US announced Rijndael algorithm as the advanced encryption standard (AES) in October 2000, Despite AES surpassing in security the data encryption standard (DES), it is still rare to be implemented in smart cards, due to the reason of deficient AES coprocessors. Here a chip operation system (COS) called NexCard, which derived from Microsoft's Windows COS, is used as the AES implementation platform. After a suitable COS architecture design for AES and methodology of efficient memory usage, the simulation result shows that direct embedding AES encryption attains 0.56 ms at system clock 15 MHz on the INFINEON SLE66CX322P chip without existence of coprocessor. Corresponding to the development needs in smart card cryptographic algorithm implementations, and different level of the security design specifications, a concept to conjoin numbers of algorithms into single smart card called cipher system on demand (CSOD) method is accomplished in this study concurrently. This is a method utilizing the multiapplication capability of NexCard v2.0 to execute the same AES algorithm as an on-card applet. Although the performance of CSOD is not as good as AES embedded method, CSOD can provide the same result in the situation of adaptability and extendibility.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130042098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Intelligence security home network 智能安全家庭网络
R. Volner, L. Pousek
The term security network intelligence is widely used in the field of communication security network. A number of new and potentially concepts and products based on the concept of security network intelligence have been introduced, including smart flows, intelligent routing, and intelligent Web switching. Many intelligent systems focus on a specific security service, function, or device, and do not provide true end-to-end service network intelligence. True security network intelligence requires more than a set of disconnected elements, it requires an interconnecting and functionally coupled architecture that enables the various functional levels to interact and communicate with each other. We propose a uniform work for understanding end-to-end communication security network intelligence (CSNI), which is defined as the ability of a network to act appropriately in a changing environment. We consider an appropriate action to be one that increases the optimal and efficient use of network resources in delivering services, and we define success as the achievement of behaviour sub-goals that support the service provider's ultimate goals, which are defined external to the network system. The work presented incorporates the functional elements of intelligence into computational modules and interconnects the modules into networks and hierarchies that have spatial, logical, and temporal properties. Based on the work proposed, we describe an end-to-end multiservice network application spanning the network security management layer, optical layer, switching/routing layer, security services layer, and other layers.
安防网络智能一词被广泛应用于通信安防网络领域。基于安全网络智能的概念,已经引入了许多新的和潜在的概念和产品,包括智能流、智能路由和智能Web交换。许多智能系统专注于特定的安全服务、功能或设备,并没有提供真正的端到端服务网络智能。真正的安全网络智能需要的不仅仅是一组不相连的元素,它需要一个相互连接和功能耦合的架构,使各个功能层能够相互交互和通信。我们提出了一个统一的工作来理解端到端通信安全网络智能(CSNI),它被定义为网络在不断变化的环境中适当行动的能力。我们认为适当的行动是在提供服务时增加网络资源的最佳和有效利用,我们将成功定义为实现支持服务提供者最终目标的行为子目标,这些目标是在网络系统外部定义的。所提出的工作将智能的功能元素整合到计算模块中,并将这些模块连接到具有空间、逻辑和时间属性的网络和层次结构中。在此基础上,我们描述了一个横跨网络安全管理层、光层、交换/路由层、安全服务层和其他层的端到端多业务网络应用。
{"title":"Intelligence security home network","authors":"R. Volner, L. Pousek","doi":"10.1109/CCST.2003.1297531","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297531","url":null,"abstract":"The term security network intelligence is widely used in the field of communication security network. A number of new and potentially concepts and products based on the concept of security network intelligence have been introduced, including smart flows, intelligent routing, and intelligent Web switching. Many intelligent systems focus on a specific security service, function, or device, and do not provide true end-to-end service network intelligence. True security network intelligence requires more than a set of disconnected elements, it requires an interconnecting and functionally coupled architecture that enables the various functional levels to interact and communicate with each other. We propose a uniform work for understanding end-to-end communication security network intelligence (CSNI), which is defined as the ability of a network to act appropriately in a changing environment. We consider an appropriate action to be one that increases the optimal and efficient use of network resources in delivering services, and we define success as the achievement of behaviour sub-goals that support the service provider's ultimate goals, which are defined external to the network system. The work presented incorporates the functional elements of intelligence into computational modules and interconnects the modules into networks and hierarchies that have spatial, logical, and temporal properties. Based on the work proposed, we describe an end-to-end multiservice network application spanning the network security management layer, optical layer, switching/routing layer, security services layer, and other layers.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130284561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Defining requirements for network solution in protection profiles 定义保护配置文件中网络解决方案的需求
Y. Sung, Eun-Kyoung Yi, Byung-Gyu No, Jae Sung Kim
The international standards about computer security are widely being used for both government and commercial sector. Many countries seek for their computer security at the common criteria (CC), so organizations learn more how to make protection profiles (PPs) to protect them from outside threats. However in case people make protection profiles using both "Guide for the Production of PPs and STs" and the common criteria, they confront some problems when defining requirements for network-wide systems instead of a single system. Many requirements in the CC are described based on a single system's activities. We found that network-wide product's PPs are required of different approach, where some statements in the CC are modified or newly extended. We show that how the network-wide targets of evaluation (TOEs) are different from a single system TOE in terms of its protection scope. This paper is of prior interest to PP/ST writers who have tasks of composing network product, or typically IDS PP/ST.
计算机安全的国际标准被广泛应用于政府和商业部门。许多国家都在寻求符合通用标准(CC)的计算机安全,因此组织更多地学习如何制作保护配置文件(pp)来保护自己免受外部威胁。然而,如果人们同时使用“PPs和STs生产指南”和通用标准来制定保护配置文件,他们在定义整个网络系统而不是单一系统的要求时就会遇到一些问题。CC中的许多需求都是基于单个系统的活动来描述的。我们发现,全网产品的pp需要不同的方法,其中CC中的一些语句被修改或新扩展。我们展示了网络范围评估目标(TOE)在其保护范围方面与单个系统TOE的不同之处。本文是优先感兴趣的PP/ST作家谁有组成网络产品的任务,或典型的IDS PP/ST。
{"title":"Defining requirements for network solution in protection profiles","authors":"Y. Sung, Eun-Kyoung Yi, Byung-Gyu No, Jae Sung Kim","doi":"10.1109/CCST.2003.1297581","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297581","url":null,"abstract":"The international standards about computer security are widely being used for both government and commercial sector. Many countries seek for their computer security at the common criteria (CC), so organizations learn more how to make protection profiles (PPs) to protect them from outside threats. However in case people make protection profiles using both \"Guide for the Production of PPs and STs\" and the common criteria, they confront some problems when defining requirements for network-wide systems instead of a single system. Many requirements in the CC are described based on a single system's activities. We found that network-wide product's PPs are required of different approach, where some statements in the CC are modified or newly extended. We show that how the network-wide targets of evaluation (TOEs) are different from a single system TOE in terms of its protection scope. This paper is of prior interest to PP/ST writers who have tasks of composing network product, or typically IDS PP/ST.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114934666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the security of multimedia video information 浅谈多媒体视频信息的安全性
J.-R.J. Shieh
The distribution of multimedia information has many applications such as video-on-demand, video conferencing, and video broadcast. It is very challenging to maintain the high quality content delivery and in the mean time to preserve the digital rights management. In the past few years, many video encryption algorithms have been proposed, but the security of the algorithms have not been adequately analyzed. In this paper several methods were proposed to evaluate the security of encrypted MPEG video. Our Take, Skip, and Permute (ISP) solutions to achieve reliable MPEG encryption are presented.
多媒体信息的分发有许多应用,如视频点播、视频会议和视频广播。保持高质量的内容交付,同时保持数字版权管理是非常具有挑战性的。在过去的几年里,人们提出了许多视频加密算法,但对这些算法的安全性分析不够。本文提出了几种评估加密MPEG视频安全性的方法。我们的取、跳和置换(ISP)解决方案,以实现可靠的MPEG加密。
{"title":"On the security of multimedia video information","authors":"J.-R.J. Shieh","doi":"10.1109/CCST.2003.1297534","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297534","url":null,"abstract":"The distribution of multimedia information has many applications such as video-on-demand, video conferencing, and video broadcast. It is very challenging to maintain the high quality content delivery and in the mean time to preserve the digital rights management. In the past few years, many video encryption algorithms have been proposed, but the security of the algorithms have not been adequately analyzed. In this paper several methods were proposed to evaluate the security of encrypted MPEG video. Our Take, Skip, and Permute (ISP) solutions to achieve reliable MPEG encryption are presented.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114935760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cryptanalysis of a strong proxy signature scheme with proxy signer privacy protection 具有代理签名者隐私保护的强代理签名方案的密码分析
Hung-Min Sun, Bin-Tsan Hsieh
Shum and Wei proposed an enhancement to the Lee et al.'s strong proxy signature such that the proxy signer's identity is hidden behind an alias. We show that Shum and Wei's enhancement is insecure against the original signer's forgery. In other words, their scheme does not possess the strong unforgeability security requirement.
Shum和Wei提出了对Lee等人的强代理签名的增强,使代理签名者的身份隐藏在别名后面。我们证明了沈和魏的增强对原始签名者的伪造是不安全的。也就是说,他们的方案不具备较强的不可伪造性安全要求。
{"title":"Cryptanalysis of a strong proxy signature scheme with proxy signer privacy protection","authors":"Hung-Min Sun, Bin-Tsan Hsieh","doi":"10.1109/CCST.2003.1297606","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297606","url":null,"abstract":"Shum and Wei proposed an enhancement to the Lee et al.'s strong proxy signature such that the proxy signer's identity is hidden behind an alias. We show that Shum and Wei's enhancement is insecure against the original signer's forgery. In other words, their scheme does not possess the strong unforgeability security requirement.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"634 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115112570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Robust image watermarking based on hybrid transformation 基于混合变换的鲁棒图像水印
D. Lou, Chia-Hung Sung
Watermarking techniques are mainly used for protecting intellectual property right. The transparency and robustness of watermarks are critical. However, they are often conflicting. We propose a new image watermarking scheme, which incorporates two kinds of transformation technologies to provide the better compromises between the visual quality and the robustness for resisting various signal processing or degradation. This algorithm utilizes the wavelet multiresolutional structure to select the location for the watermark. The quantization errors in the discrete cosine transform domain achieve the smallest visual degradation. Embedding the watermark within the image by introducing reduced distortion into transformed coefficients provides the robustness for the watermark detection without degrading the image quality. Besides, the proposed method does not require the original image to detect the watermark. Some experimental results demonstrate that the proposed scheme is more robust than previous schemes in terms of certain perceptual quality.
水印技术主要用于知识产权保护。水印的透明性和鲁棒性至关重要。然而,它们往往是相互冲突的。我们提出了一种新的图像水印方案,该方案结合了两种变换技术,在视觉质量和抗各种信号处理或退化的鲁棒性之间提供了更好的折衷。该算法利用小波多分辨率结构选择水印的位置。离散余弦变换域的量化误差达到最小的视觉退化。通过在变换后的系数中引入减小的失真,将水印嵌入图像中,在不降低图像质量的前提下,增强了水印检测的鲁棒性。此外,该方法不需要对原始图像进行水印检测。实验结果表明,在一定的感知质量方面,该方案比现有方案具有更强的鲁棒性。
{"title":"Robust image watermarking based on hybrid transformation","authors":"D. Lou, Chia-Hung Sung","doi":"10.1109/CCST.2003.1297592","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297592","url":null,"abstract":"Watermarking techniques are mainly used for protecting intellectual property right. The transparency and robustness of watermarks are critical. However, they are often conflicting. We propose a new image watermarking scheme, which incorporates two kinds of transformation technologies to provide the better compromises between the visual quality and the robustness for resisting various signal processing or degradation. This algorithm utilizes the wavelet multiresolutional structure to select the location for the watermark. The quantization errors in the discrete cosine transform domain achieve the smallest visual degradation. Embedding the watermark within the image by introducing reduced distortion into transformed coefficients provides the robustness for the watermark detection without degrading the image quality. Besides, the proposed method does not require the original image to detect the watermark. Some experimental results demonstrate that the proposed scheme is more robust than previous schemes in terms of certain perceptual quality.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129494614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
ID-based cryptographic schemes based on factoring and discrete logarithms 基于因子分解和离散对数的基于id的密码方案
Pin-Chang Su, E. Lu, H. Chang
We present three identity-based cryptographic schemes based on two-known assumptions. The security of the proposed scheme follows from the difficulties in simultaneously solving the factoring (FAC) and discrete logarithms (DL) problems with arithmetic modulo of almost the same size. The proposed schemes support user identification, digital signature, and key distribution.
我们提出了基于两个已知假设的三种基于身份的加密方案。该方案的安全性来自于同时求解具有几乎相同大小的算术模的因式分解(FAC)和离散对数(DL)问题的困难。提出的方案支持用户识别、数字签名和密钥分发。
{"title":"ID-based cryptographic schemes based on factoring and discrete logarithms","authors":"Pin-Chang Su, E. Lu, H. Chang","doi":"10.1109/CCST.2003.1297619","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297619","url":null,"abstract":"We present three identity-based cryptographic schemes based on two-known assumptions. The security of the proposed scheme follows from the difficulties in simultaneously solving the factoring (FAC) and discrete logarithms (DL) problems with arithmetic modulo of almost the same size. The proposed schemes support user identification, digital signature, and key distribution.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127202569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A knowledge-based model for defending distributed DoS 基于知识的分布式DoS防御模型
Shui-Sheng Lin, ShunChieh Lin, S. Tseng
The knowledge-based model is proposed to solve the prediction problem in distributed DoS. There are three phases in this knowledge-based model. The detecting rules and filtering rules are constructed in knowledge construction phase from characteristic analyzer and domain experts. Based upon false negative criterion, the detecting phase use the detecting rules to finds out the control traffic of distributed DoS. However, some false alarms appear because of the similar traffic with control traffic from special services. Therefore, the filtering rules are used to reduce the false alarm rate in filtering phase and detecting phase.
提出了一种基于知识的模型来解决分布式DoS的预测问题。在这个基于知识的模型中有三个阶段。在知识构建阶段,由特征分析器和领域专家构建检测规则和过滤规则。检测阶段基于假阴性准则,利用检测规则找出分布式拒绝服务的控制流量。但是,由于与特殊业务的控制流量相似,会出现一些虚警。因此,采用滤波规则来降低滤波阶段和检测阶段的虚警率。
{"title":"A knowledge-based model for defending distributed DoS","authors":"Shui-Sheng Lin, ShunChieh Lin, S. Tseng","doi":"10.1109/CCST.2003.1297569","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297569","url":null,"abstract":"The knowledge-based model is proposed to solve the prediction problem in distributed DoS. There are three phases in this knowledge-based model. The detecting rules and filtering rules are constructed in knowledge construction phase from characteristic analyzer and domain experts. Based upon false negative criterion, the detecting phase use the detecting rules to finds out the control traffic of distributed DoS. However, some false alarms appear because of the similar traffic with control traffic from special services. Therefore, the filtering rules are used to reduce the false alarm rate in filtering phase and detecting phase.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121303935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TSRG randomized cryptosystem TSRG随机密码系统
G. Hussein, M. David
This paper discusses the use of randomized encryption techniques for designing an algorithm of a provably secure two stage RNG (TSRG) cryptosystem for message exchange. A built-in TSRG RNG is a distinguishable primitive in the proposed cryptosystem design where instantaneous real time. One time pad (OTP)/spl I.bar/like data is generated. Most cryptography relies on unproven complexity assumptions like integer factorization being computationally hard, with the adversary limited by computing power. However, advances in cryptanalysis, computing technology and unpublished researches may make current cryptosystems insecure. Shannon's pessimistic result essentially denotes that if the adversary is all-powerful, then efficient practical solutions for information-theoretic security do not exist. However, the TSRG RNG implements a simple idea of reseeding the RNG at unpredictable instants to an unpredictable state creating a new RNG model before the attackers can acquire enough information to identify the current model. In TSRG design, security is based on a proven insoluble problem. The previous published work proves that TSRG RNG produced output is random and cannot be predicated using available technologies and mathematical theories if the state of the generator is not compromised. This requires a secure way of exchanging of the OTP-like digest to be expanded at the receiver side as well as preventing the attackers from mounting state compromise attacks. The paper discuses how randomized encryption techniques can aid in designing the TSRG cryptosystem to defend possible cracking trials. Suitable usage of two randomized encryption techniques eliminates the threat of message related attacks and smoothes out the statistical distribution of inputs to the algorithm.
本文讨论了使用随机加密技术设计可证明安全的两阶段RNG (TSRG)消息交换密码系统的算法。内置的TSRG RNG是所提出的密码系统设计中的一个可区分的原语,其中瞬时实时性。一次性pad (OTP)/spl I.bar/类似数据生成。大多数密码学依赖于未经证明的复杂性假设,比如整数分解在计算上很困难,对手受到计算能力的限制。然而,密码分析、计算技术的进步和未发表的研究可能会使当前的密码系统变得不安全。香农的悲观结果基本上表明,如果对手是全能的,那么信息理论安全的有效实用解决方案就不存在。然而,TSRG RNG实现了一个简单的想法,即在不可预测的时刻将RNG重新播种到不可预测的状态,在攻击者能够获得足够的信息来识别当前模型之前创建一个新的RNG模型。在TSRG设计中,安全性是基于一个被证明无法解决的问题。先前发表的工作证明,TSRG RNG产生的输出是随机的,如果生成器的状态没有受到损害,则不能使用可用的技术和数学理论来预测。这需要一种安全的方式来交换类似otp的摘要,以便在接收端进行扩展,并防止攻击者进行状态妥协攻击。本文讨论了随机加密技术如何帮助设计TSRG密码系统来防御可能的破解试验。适当使用两种随机化加密技术可以消除消息相关攻击的威胁,并使算法输入的统计分布变得平滑。
{"title":"TSRG randomized cryptosystem","authors":"G. Hussein, M. David","doi":"10.1109/CCST.2003.1297617","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297617","url":null,"abstract":"This paper discusses the use of randomized encryption techniques for designing an algorithm of a provably secure two stage RNG (TSRG) cryptosystem for message exchange. A built-in TSRG RNG is a distinguishable primitive in the proposed cryptosystem design where instantaneous real time. One time pad (OTP)/spl I.bar/like data is generated. Most cryptography relies on unproven complexity assumptions like integer factorization being computationally hard, with the adversary limited by computing power. However, advances in cryptanalysis, computing technology and unpublished researches may make current cryptosystems insecure. Shannon's pessimistic result essentially denotes that if the adversary is all-powerful, then efficient practical solutions for information-theoretic security do not exist. However, the TSRG RNG implements a simple idea of reseeding the RNG at unpredictable instants to an unpredictable state creating a new RNG model before the attackers can acquire enough information to identify the current model. In TSRG design, security is based on a proven insoluble problem. The previous published work proves that TSRG RNG produced output is random and cannot be predicated using available technologies and mathematical theories if the state of the generator is not compromised. This requires a secure way of exchanging of the OTP-like digest to be expanded at the receiver side as well as preventing the attackers from mounting state compromise attacks. The paper discuses how randomized encryption techniques can aid in designing the TSRG cryptosystem to defend possible cracking trials. Suitable usage of two randomized encryption techniques eliminates the threat of message related attacks and smoothes out the statistical distribution of inputs to the algorithm.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122267804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1