首页 > 最新文献

IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.最新文献

英文 中文
Building intrusion pattern miner for snort network intrusion detection system 构建snort网络入侵检测系统的入侵模式挖掘器
Lih-Chyau Wuu, Chi-Hsiang Hung, Sout-Fong Chen
We propose a framework for Snort network-based intrusion detection system to make it have the ability of not only catching new attack patterns automatically, but also detecting sequential attack behaviors. To do that, we first build an intrusion pattern discovery module to find single intrusion patterns and sequential intrusion patterns from a collection of attack packets in offline training phase. The module applies data mining technique to extract descriptive attack signatures from large stores of packets, and then it converts the signatures to Snort detection rules for online detection. In order to detect sequential intrusion behavior, the Snort detection engine is accompanied with our intrusion behavior detection engine. When a series of incoming packets match the signatures representing sequential intrusion scenarios, intrusion behavior detection engine make an alert.
提出了一种基于Snort网络的入侵检测系统框架,使其不仅能够自动捕捉新的攻击模式,而且能够检测连续的攻击行为。为此,我们首先构建入侵模式发现模块,从离线训练阶段的攻击包集合中发现单个入侵模式和顺序入侵模式。该模块利用数据挖掘技术从大量信息包中提取描述性攻击签名,并将签名转换为Snort检测规则进行在线检测。为了检测顺序入侵行为,Snort检测引擎与我们的入侵行为检测引擎一起使用。当一系列进入的报文命中代表连续入侵场景的签名时,入侵行为检测引擎就会发出告警。
{"title":"Building intrusion pattern miner for snort network intrusion detection system","authors":"Lih-Chyau Wuu, Chi-Hsiang Hung, Sout-Fong Chen","doi":"10.1109/CCST.2003.1297607","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297607","url":null,"abstract":"We propose a framework for Snort network-based intrusion detection system to make it have the ability of not only catching new attack patterns automatically, but also detecting sequential attack behaviors. To do that, we first build an intrusion pattern discovery module to find single intrusion patterns and sequential intrusion patterns from a collection of attack packets in offline training phase. The module applies data mining technique to extract descriptive attack signatures from large stores of packets, and then it converts the signatures to Snort detection rules for online detection. In order to detect sequential intrusion behavior, the Snort detection engine is accompanied with our intrusion behavior detection engine. When a series of incoming packets match the signatures representing sequential intrusion scenarios, intrusion behavior detection engine make an alert.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114605625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
A hybrid intelligent intrusion detection system to recognize novel attacks 一种用于识别新型攻击的混合智能入侵检测系统
Dwen-Ren Tsai, Wen-Pin Tai, Chi-Fang Chang
We propose a hybrid intelligent intrusion detection system to recognize novel attacks. Current works in intrusion detection solve the anomaly detection and the misuse detection. The misuse detection cannot recognize the new types of intrusions; while the abnormal detection also suffers from the false alarms. The mechanism to detect new forms of attacks in the systems will be the most important issue for intrusion detection For this purpose, we apply the neural network approach to learn the attack definitions and the fuzzy inference approach to describe the relations of attack properties for recognition This study concentrates the focus on detecting distributed denial of service attacks to develop this system. Experiment results will verify the performance of the model.
我们提出了一种混合智能入侵检测系统来识别新的攻击。目前的入侵检测工作主要集中在异常检测和误用检测两方面。误用检测不能识别新的入侵类型;而异常检测也存在误报的问题。系统中新形式攻击的检测机制将是入侵检测中最重要的问题,为此,我们采用神经网络方法学习攻击定义,模糊推理方法描述攻击属性之间的关系进行识别,研究重点是检测分布式拒绝服务攻击来开发该系统。实验结果将验证该模型的性能。
{"title":"A hybrid intelligent intrusion detection system to recognize novel attacks","authors":"Dwen-Ren Tsai, Wen-Pin Tai, Chi-Fang Chang","doi":"10.1109/CCST.2003.1297598","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297598","url":null,"abstract":"We propose a hybrid intelligent intrusion detection system to recognize novel attacks. Current works in intrusion detection solve the anomaly detection and the misuse detection. The misuse detection cannot recognize the new types of intrusions; while the abnormal detection also suffers from the false alarms. The mechanism to detect new forms of attacks in the systems will be the most important issue for intrusion detection For this purpose, we apply the neural network approach to learn the attack definitions and the fuzzy inference approach to describe the relations of attack properties for recognition This study concentrates the focus on detecting distributed denial of service attacks to develop this system. Experiment results will verify the performance of the model.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"322 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123303186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
SIM-based subscriber authentication for wireless local area networks 基于sim卡的无线局域网用户认证
Yuh-Ren Tsai, Cheng-Ju Chang
Authentication and roaming are critical issues for wireless data applications. Due to the strong points of mobile cellular network - large subscriber base, secure authentication mechanism, well established roaming agreements and well defined service entries, - it is favorable to integrate the authentication mechanism of WLAN into that of mobile cellular network. For GSM/GPRS cellular systems, the subscriber identity module (SIM) card is used for user identification, authentication and message encryption. Thus, it is feasible to authenticate the subscribers in WLAN via exchanging the authentication information between mobile cellular network and subscribers' SIM cards. The issue of SIM-based subscriber authentication for WLAN is investigated. By utilizing the GSM authentication information, an authentication mechanism is proposed and an experimental system is implemented.
身份验证和漫游是无线数据应用的关键问题。由于移动蜂窝网络具有用户基数大、认证机制安全、漫游协议完善、业务入口定义明确等优点,因此将WLAN的认证机制与移动蜂窝网络的认证机制相结合是有利的。对于GSM/GPRS蜂窝系统,用户身份模块(SIM)卡用于用户识别、认证和消息加密。因此,通过在移动蜂窝网络和用户的SIM卡之间交换认证信息来对WLAN中的用户进行认证是可行的。研究了基于sim卡的无线局域网用户认证问题。利用GSM认证信息,提出了一种认证机制,并实现了实验系统。
{"title":"SIM-based subscriber authentication for wireless local area networks","authors":"Yuh-Ren Tsai, Cheng-Ju Chang","doi":"10.1109/CCST.2003.1297605","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297605","url":null,"abstract":"Authentication and roaming are critical issues for wireless data applications. Due to the strong points of mobile cellular network - large subscriber base, secure authentication mechanism, well established roaming agreements and well defined service entries, - it is favorable to integrate the authentication mechanism of WLAN into that of mobile cellular network. For GSM/GPRS cellular systems, the subscriber identity module (SIM) card is used for user identification, authentication and message encryption. Thus, it is feasible to authenticate the subscribers in WLAN via exchanging the authentication information between mobile cellular network and subscribers' SIM cards. The issue of SIM-based subscriber authentication for WLAN is investigated. By utilizing the GSM authentication information, an authentication mechanism is proposed and an experimental system is implemented.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117082879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The neuron security of joint defense for network intrusion detection 网络入侵检测联合防御的神经元安全性
Jain-Shing Wu
The explosive growth in Internet connectivity and e-service has resulted in unprecedented demands for security technologies. Host and network security are getting more critical and more complex due to the diversified and evolved ways of attack form anyplace in Internet world. Most of the technologies been developed are focusing on protecting individual systems and limited scope of network by using different diagnosis and detection approaches. Both commercial and noncommercial solutions, called IDS (intrusion detection system), usually maintain their own proprietary databases by collecting detection patterns. In general, more patterns collected and more up-to-date of the databases surely increase the capabilities of their bundled IDS solutions. However, due to the coverage limitation and late awareness, there still have new growing uncovered breaches that single IDS would not be able to catch up. The reasons are two: 1) Any one proprietary IDS is incapable of collecting so many detection patterns daily brought up in Internet world. 2) Systems under certain proprietary IDS's protection are unable to get instant notification of new detection patterns, most of which are discovered by other IDSs. In order to reduce the risks of coverage limitation and time delay of new types of attack, a joint defense service framework is been proposed, which work as human nervous system to protect every nodes within the system at all.
互联网连接和电子服务的爆炸式增长对安全技术产生了前所未有的需求。由于网络世界中各种攻击方式的多样化和不断发展,主机和网络安全变得越来越重要和复杂。目前开发的大多数技术都是通过使用不同的诊断和检测方法来保护单个系统和有限的网络范围。商业和非商业解决方案,称为IDS(入侵检测系统),通常通过收集检测模式来维护自己的专有数据库。一般来说,收集到的模式越多,数据库更新得越快,其捆绑的IDS解决方案的功能就越强。然而,由于覆盖范围的限制和意识的滞后,仍然有越来越多的新发现的漏洞,单个IDS无法赶上。原因有二:1)任何一个专有的IDS都无法收集每天在Internet世界中出现的如此多的检测模式。2)在某些专有IDS保护下的系统无法获得新的检测模式的即时通知,其中大多数是由其他IDS发现的。为了降低新型攻击的覆盖限制和时延风险,提出了一种像人的神经系统一样对系统内的每个节点进行全面保护的联合防御服务框架。
{"title":"The neuron security of joint defense for network intrusion detection","authors":"Jain-Shing Wu","doi":"10.1109/CCST.2003.1297610","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297610","url":null,"abstract":"The explosive growth in Internet connectivity and e-service has resulted in unprecedented demands for security technologies. Host and network security are getting more critical and more complex due to the diversified and evolved ways of attack form anyplace in Internet world. Most of the technologies been developed are focusing on protecting individual systems and limited scope of network by using different diagnosis and detection approaches. Both commercial and noncommercial solutions, called IDS (intrusion detection system), usually maintain their own proprietary databases by collecting detection patterns. In general, more patterns collected and more up-to-date of the databases surely increase the capabilities of their bundled IDS solutions. However, due to the coverage limitation and late awareness, there still have new growing uncovered breaches that single IDS would not be able to catch up. The reasons are two: 1) Any one proprietary IDS is incapable of collecting so many detection patterns daily brought up in Internet world. 2) Systems under certain proprietary IDS's protection are unable to get instant notification of new detection patterns, most of which are discovered by other IDSs. In order to reduce the risks of coverage limitation and time delay of new types of attack, a joint defense service framework is been proposed, which work as human nervous system to protect every nodes within the system at all.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121422828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding concepts in the defence in depth strategy 理解纵深防守策略中的概念
C. Smith
The defence in depth strategy is a fundamental principle in the physical protection of the assets of an organisation. The robustness of the strategy has allowed it to be applied to a range of situations where assets need to be protected. This study seeks to examine the understanding of novice learners' perceptions of the defence in depth principles through the knowledge structure approach to concepts in the strategy. The multidimensional scaling (MDS) statistical technique has been applied to dissimilarity measures on a range of facilities according to the defence in depth functions of deterrence, detection, delay, and response. The barriers that correspond to these functions are considered as the analysis standard for the set of facilities. Pre- and post-instruction knowledge structures for the defence in depth functions of deterrence, detection, delay and response have been produced for novice learners. The knowledge structures for these same functions were produced for an expert group in understanding defence in depth. A comparison of knowledge structures for novice learners and the expert group indicates that novice learners knowledge structures become more like the experts structures with instruction.
纵深防御战略是对组织资产进行物理保护的基本原则。该策略的健壮性使其能够应用于需要保护资产的一系列情况。本研究旨在透过策略概念的知识结构方法,检视初学学习者对深度防御原则的认知。多维标度(MDS)统计技术已应用于根据威慑、探测、延迟和响应等纵深防御功能对一系列设施的不同度量。与这些功能相对应的屏障被视为一组设施的分析标准。为新手学习者建立了威慑、检测、延迟和反应等深度防御功能的教学前和教学后知识结构。这些相同功能的知识结构是为深入理解防御的专家组而产生的。新手组和专家组的知识结构比较表明,新手组的知识结构在指导下更接近专家组的知识结构。
{"title":"Understanding concepts in the defence in depth strategy","authors":"C. Smith","doi":"10.1109/CCST.2003.1297528","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297528","url":null,"abstract":"The defence in depth strategy is a fundamental principle in the physical protection of the assets of an organisation. The robustness of the strategy has allowed it to be applied to a range of situations where assets need to be protected. This study seeks to examine the understanding of novice learners' perceptions of the defence in depth principles through the knowledge structure approach to concepts in the strategy. The multidimensional scaling (MDS) statistical technique has been applied to dissimilarity measures on a range of facilities according to the defence in depth functions of deterrence, detection, delay, and response. The barriers that correspond to these functions are considered as the analysis standard for the set of facilities. Pre- and post-instruction knowledge structures for the defence in depth functions of deterrence, detection, delay and response have been produced for novice learners. The knowledge structures for these same functions were produced for an expert group in understanding defence in depth. A comparison of knowledge structures for novice learners and the expert group indicates that novice learners knowledge structures become more like the experts structures with instruction.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128472173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
An automatic bi-directional passing-people counting method based on color image processing 一种基于彩色图像处理的双向行人自动计数方法
Thou-Ho Chen
Based on color image processing, an automatic bidirectional counting method of pedestrians through a gate is proposed. In the developed technique, one color video camera is hung from the ceiling of the gate with a directly downward view so that the passing people will be observed from just overhead. Firstly, the passing people is roughly counted with the area of people in an image. The moving direction of the pedestrian can be oriented by tracking each people pattern through analyzing its HSI histogram. With features extracted from the quantized histograms of I (intensity) or H (hue), the first counting can be refined. Experimental results show that an 100% accuracy of bidirectional counting can be achieved in the case of multiple isolated one-person patterns and the same accuracy can be also obtained unless the people number of a multiple-person pattern is over five.
提出了一种基于彩色图像处理的行人自动双向计数方法。在先进的技术中,一个彩色摄像机悬挂在大门的天花板上,直接向下看,这样从头顶上就可以观察到经过的人。首先,将经过的人与图像中人的面积进行粗略统计。通过分析行人的HSI直方图,跟踪行人的移动方向。通过从I(强度)或H(色相)的量化直方图中提取特征,可以对第一次计数进行细化。实验结果表明,在多个孤立的单人模式下,双向计数可以达到100%的准确率,除非多人模式的人数超过5人,否则也可以达到相同的准确率。
{"title":"An automatic bi-directional passing-people counting method based on color image processing","authors":"Thou-Ho Chen","doi":"10.1109/CCST.2003.1297560","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297560","url":null,"abstract":"Based on color image processing, an automatic bidirectional counting method of pedestrians through a gate is proposed. In the developed technique, one color video camera is hung from the ceiling of the gate with a directly downward view so that the passing people will be observed from just overhead. Firstly, the passing people is roughly counted with the area of people in an image. The moving direction of the pedestrian can be oriented by tracking each people pattern through analyzing its HSI histogram. With features extracted from the quantized histograms of I (intensity) or H (hue), the first counting can be refined. Experimental results show that an 100% accuracy of bidirectional counting can be achieved in the case of multiple isolated one-person patterns and the same accuracy can be also obtained unless the people number of a multiple-person pattern is over five.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133868886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Vulnerability assessment system (VAS) 脆弱性评估系统(VAS)
Cabin Ying, A. Tsai, H. Yu
Institute for Information Industry is currently handling a project for National Information and Communication Security Taskforce of Executive Yuan. One of the missions of this project is to conduct information security assessments for the current security situation of the national network. Although there are already many commercial software packages on the market to help diagnose security vulnerabilities, but most of these software packages are aiming for small to medium size organizations and only for one single enterprise infrastructure. Therefore, they are not able to perform an over-organization, integrated vulnerability assessment analysis. Moreover, the vulnerability assessment is only the beginning step of solving information security problems; there is a need for a comprehensive management mechanism for information security vulnerability assessment, to let IT staff precisely resolve the security problems of the information systems. As the result, the design goal of VAS is to provide assistance to perform a comprehensive management mechanism for information security vulnerability assessment.
资讯产业研究所现正办理一项行政院国家资讯通讯安全专责小组之专案。该项目的任务之一是对当前国家网络安全形势进行信息安全评估。尽管市场上已经有许多商业软件包可以帮助诊断安全漏洞,但是这些软件包中的大多数都是针对中小型组织的,并且只针对单一的企业基础设施。因此,他们不能执行一个跨组织的、集成的脆弱性评估分析。此外,漏洞评估只是解决信息安全问题的第一步;需要一套全面的信息安全漏洞评估管理机制,让IT人员精准解决信息系统的安全问题。因此,VAS的设计目标是协助执行信息安全漏洞评估的综合管理机制。
{"title":"Vulnerability assessment system (VAS)","authors":"Cabin Ying, A. Tsai, H. Yu","doi":"10.1109/CCST.2003.1297596","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297596","url":null,"abstract":"Institute for Information Industry is currently handling a project for National Information and Communication Security Taskforce of Executive Yuan. One of the missions of this project is to conduct information security assessments for the current security situation of the national network. Although there are already many commercial software packages on the market to help diagnose security vulnerabilities, but most of these software packages are aiming for small to medium size organizations and only for one single enterprise infrastructure. Therefore, they are not able to perform an over-organization, integrated vulnerability assessment analysis. Moreover, the vulnerability assessment is only the beginning step of solving information security problems; there is a need for a comprehensive management mechanism for information security vulnerability assessment, to let IT staff precisely resolve the security problems of the information systems. As the result, the design goal of VAS is to provide assistance to perform a comprehensive management mechanism for information security vulnerability assessment.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131376822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Evaluation of information security related risks of an organization: the application of the multicriteria decision-making method 组织的信息安全相关风险评估:多准则决策方法的应用
Bao-Chyuan Guan, Chi-Chun Lo, Ping Wang, Jaw-Shi Hwang
In the wake of the fast popularization of information and the rise of electronic commerce, information security is gaining much attention. How to perform the evaluation of the value of assets, how to perform the analysis of the risks associated with assets, and how to protect information assets from sabotage, theft and tamper are important topics in the study of the management of information security. We address the aspects of confidentiality, integrity and availability of information and apply the Analytic Hierarchy Process (AHP) to consolidate expert's opinions on information risks, in order to construct an integrated framework for risk analysis. The BS7799 standard and the risk level matrix (RLM) are used accordingly to evaluate the effectiveness of and to categorize the risk management measures and to create a complete model for the assessment of information assets related risks. Finally, the research results are verified by a case study. The results can be used by organizations as references for information security planning and management process improvements.
随着信息的快速普及和电子商务的兴起,信息安全受到越来越多的关注。如何对资产价值进行评估,如何对与资产相关的风险进行分析,如何保护信息资产不被破坏、盗窃和篡改,是信息安全管理研究的重要课题。我们从信息的保密性、完整性和可用性三个方面着手,运用层次分析法(AHP)整合专家对信息风险的意见,构建一个综合的风险分析框架。根据BS7799标准和风险等级矩阵(RLM)对风险管理措施的有效性进行评价和分类,并为信息资产相关风险的评估创建一个完整的模型。最后,通过一个案例对研究结果进行了验证。其结果可被组织用作信息安全规划和管理过程改进的参考。
{"title":"Evaluation of information security related risks of an organization: the application of the multicriteria decision-making method","authors":"Bao-Chyuan Guan, Chi-Chun Lo, Ping Wang, Jaw-Shi Hwang","doi":"10.1109/CCST.2003.1297555","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297555","url":null,"abstract":"In the wake of the fast popularization of information and the rise of electronic commerce, information security is gaining much attention. How to perform the evaluation of the value of assets, how to perform the analysis of the risks associated with assets, and how to protect information assets from sabotage, theft and tamper are important topics in the study of the management of information security. We address the aspects of confidentiality, integrity and availability of information and apply the Analytic Hierarchy Process (AHP) to consolidate expert's opinions on information risks, in order to construct an integrated framework for risk analysis. The BS7799 standard and the risk level matrix (RLM) are used accordingly to evaluate the effectiveness of and to categorize the risk management measures and to create a complete model for the assessment of information assets related risks. Finally, the research results are verified by a case study. The results can be used by organizations as references for information security planning and management process improvements.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121375012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A robust method for software self-defense 一种健壮的软件自卫方法
P. Deng, Wen-Gong Shieh, Jau-Hwang Wang, C. Tung, Chih-Pin Yen
To solve the drawbacks mentioned by Cohen [2001] and many other researchers in the software self-defense method, we propose a new improved method in this research to construct a robust immune program code I and make it almost impossible to be removed from the protected program IP. The main idea to achieve this is that we can masquerade I from being detected and removed by virus by using polymorphism techniques that are traditionally used by virus writers. Besides polymorphism, encryption, multiple compressions and mutation, we also apply other techniques to masquerade immune program code I. And let immune program code I become more than millions of different code patterns with the same function. More, we also propose a scheme to solve the generic attack of software self defense. Based on our experimental result, the software self-defense technique is really improved by our proposed method and work well in the real world.
针对Cohen[2001]等许多研究人员在软件自卫方法中提到的缺陷,我们在本研究中提出了一种新的改进方法,构建一个鲁棒的免疫程序代码I,使其几乎不可能从受保护的程序IP中被移除。实现这一目标的主要思路是,我们可以通过使用病毒编写者传统上使用的多态性技术来伪装I不被病毒检测和删除。除了多态性、加密、多重压缩和变异,我们还采用其他技术对免疫程序代码I进行伪装,使免疫程序代码I成为数百万种具有相同功能的不同代码模式。此外,我们还提出了一种解决软件防御通用攻击的方案。实验结果表明,本文提出的方法确实提高了软件防御技术,在实际应用中效果良好。
{"title":"A robust method for software self-defense","authors":"P. Deng, Wen-Gong Shieh, Jau-Hwang Wang, C. Tung, Chih-Pin Yen","doi":"10.1109/CCST.2003.1297625","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297625","url":null,"abstract":"To solve the drawbacks mentioned by Cohen [2001] and many other researchers in the software self-defense method, we propose a new improved method in this research to construct a robust immune program code I and make it almost impossible to be removed from the protected program IP. The main idea to achieve this is that we can masquerade I from being detected and removed by virus by using polymorphism techniques that are traditionally used by virus writers. Besides polymorphism, encryption, multiple compressions and mutation, we also apply other techniques to masquerade immune program code I. And let immune program code I become more than millions of different code patterns with the same function. More, we also propose a scheme to solve the generic attack of software self defense. Based on our experimental result, the software self-defense technique is really improved by our proposed method and work well in the real world.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123631691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis of a fingerprint-based remote user authentication scheme using smart cards 基于指纹的智能卡远程用户认证方案的密码分析
Bin-Tsan Hsieh, Her-Tyan Yeh, Hung-Min Sun
A remote user authentication scheme is a procedure for a server to authenticate a remote user in a network. Recently, Lee et al. proposed a fingerprint-based remote user authentication scheme to overcome the security flaw in Hwang and Li's scheme. In Lee et al.'s authentication scheme, they store two secret keys and some public elements in a smart card. We first review Lee et al.'s fingerprint-based user authentication scheme. Next, we show that Lee et al.'s scheme still suffers from the impersonation attack.
远程用户身份验证方案是服务器对网络中的远程用户进行身份验证的过程。最近,Lee等人提出了一种基于指纹的远程用户认证方案,以克服Hwang和Li方案中的安全漏洞。在Lee等人的认证方案中,他们在一张智能卡中存储了两个密钥和一些公共元素。我们首先回顾Lee等人的基于指纹的用户认证方案。接下来,我们证明了Lee等人的方案仍然遭受冒充攻击。
{"title":"Cryptanalysis of a fingerprint-based remote user authentication scheme using smart cards","authors":"Bin-Tsan Hsieh, Her-Tyan Yeh, Hung-Min Sun","doi":"10.1109/CCST.2003.1297584","DOIUrl":"https://doi.org/10.1109/CCST.2003.1297584","url":null,"abstract":"A remote user authentication scheme is a procedure for a server to authenticate a remote user in a network. Recently, Lee et al. proposed a fingerprint-based remote user authentication scheme to overcome the security flaw in Hwang and Li's scheme. In Lee et al.'s authentication scheme, they store two secret keys and some public elements in a smart card. We first review Lee et al.'s fingerprint-based user authentication scheme. Next, we show that Lee et al.'s scheme still suffers from the impersonation attack.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124870055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1