首页 > 最新文献

2020 International Conference on Software Security and Assurance (ICSSA)最新文献

英文 中文
Why Compliance is needed for Internet of Things? 为什么物联网需要遵从性?
Pub Date : 2020-10-01 DOI: 10.1109/ICSSA51305.2020.00019
Syed Rizvi, Shakir Campbell, K. Alden
The Internet of Things (IoT) is a relatively new concept that has been coined and is now commonly used in the field of Information Technology (IT). This concept is defined as many things, but the simplest way to describe IoT is as the culmination of all of the new devices, systems, applications, technology, etc. that are connected and can transmit data without the need of a human or computer. This developing industry is expected to have billions of devices interconnected in the next few years. This growth is happening in all branches of traditional IT. Different divisions of IT, such as the financial division or medical division of IT, are already moving to the IoT. While this technological advancement is conceptually astounding, just like anything new in the world of IT, there arise many questions about the security of, or lack thereof, IoT. The main purpose of this paper is not to come up with a solution to the lack of security compliance of IoT but identify that the lack of compliance laws for IoT is a problem and that traditional IT compliance laws do not work for the IoT unless modified. Instead, new compliance standards should be established to cover the subject of IoT.
物联网(IoT)是一个相对较新的概念,已经被创造出来,现在通常用于信息技术(IT)领域。这个概念被定义为许多东西,但描述物联网的最简单方法是所有新设备、系统、应用程序、技术等的高潮,这些设备、系统、应用程序、技术等相互连接,无需人工或计算机即可传输数据。这个发展中的行业预计在未来几年内将有数十亿台设备相互连接。这种增长发生在传统IT的所有分支中。不同的IT部门,如IT的金融部门或医疗部门,已经转向物联网。虽然这种技术进步在概念上令人震惊,就像IT界的任何新事物一样,但物联网的安全性或缺乏安全性引发了许多问题。本文的主要目的不是提出物联网缺乏安全合规性的解决方案,而是确定物联网缺乏合规性法律是一个问题,传统的IT合规性法律除非修改,否则不适用于物联网。相反,应该建立新的合规标准来涵盖物联网主题。
{"title":"Why Compliance is needed for Internet of Things?","authors":"Syed Rizvi, Shakir Campbell, K. Alden","doi":"10.1109/ICSSA51305.2020.00019","DOIUrl":"https://doi.org/10.1109/ICSSA51305.2020.00019","url":null,"abstract":"The Internet of Things (IoT) is a relatively new concept that has been coined and is now commonly used in the field of Information Technology (IT). This concept is defined as many things, but the simplest way to describe IoT is as the culmination of all of the new devices, systems, applications, technology, etc. that are connected and can transmit data without the need of a human or computer. This developing industry is expected to have billions of devices interconnected in the next few years. This growth is happening in all branches of traditional IT. Different divisions of IT, such as the financial division or medical division of IT, are already moving to the IoT. While this technological advancement is conceptually astounding, just like anything new in the world of IT, there arise many questions about the security of, or lack thereof, IoT. The main purpose of this paper is not to come up with a solution to the lack of security compliance of IoT but identify that the lack of compliance laws for IoT is a problem and that traditional IT compliance laws do not work for the IoT unless modified. Instead, new compliance standards should be established to cover the subject of IoT.","PeriodicalId":346706,"journal":{"name":"2020 International Conference on Software Security and Assurance (ICSSA)","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114206498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed Unit Security for 5G Base-Stations using Blockchain 使用区块链的5G基站的分布式单元安全性
Pub Date : 2020-10-01 DOI: 10.1109/ICSSA51305.2020.00010
William B. Crowe, T. Oh
5G in the United States has been rapidly growing this past year as the New Radio (NR) standards have been finalized. The top three US cellular carriers cover most major cities in 2019, and the plans are to cover most of the nation by the close of 2020. Field testing shows that 5G is meeting the promise of gigabit speeds and single digit latency over millimeter wave. 5G Security is ever so more critical with the expectation of massive IoT, M2M, VANET, and High-Speed Fixed Wireless. More devices will rely on commercially available wireless internet, it should be expected that 5G Security will be thoroughly tested by unscrupulous individuals. To enhance security, this paper will cover utilizing Blockchain for identity management of the next generation NodeB (gNB) for the user equipment (UE) would make Rogue Cellsite, man-in-the-middle-attacks, or Stingray much harder to perform. This would prevent the UE from blindly connecting to any gNB it sees and sharing sensitive information because of the connection requested from an untrusted source. While there are other potential security flaws in 5G, implementing Blockchain in a commercial network would enhance attach and handover security for all devices that use 5G.
随着新无线电(NR)标准的最终确定,美国的5G在过去一年中迅速发展。2019年,美国三大移动运营商覆盖了大多数主要城市,并计划到2020年底覆盖全国大部分地区。现场测试表明,5G正在满足千兆速度和毫米波一位数延迟的承诺。随着大规模物联网、M2M、VANET和高速固定无线的出现,5G安全变得越来越重要。更多的设备将依赖于商用无线互联网,可以预期的是,5G安全将被肆无忌惮的人彻底测试。为了提高安全性,本文将介绍利用区块链对用户设备(UE)的下一代NodeB (gNB)进行身份管理,这将使Rogue Cellsite、中间人攻击或Stingray更难执行。这将防止UE盲目连接到它看到的任何gNB,并由于从不受信任的来源请求连接而共享敏感信息。虽然5G存在其他潜在的安全漏洞,但在商业网络中实施区块链将增强所有使用5G的设备的连接和切换安全性。
{"title":"Distributed Unit Security for 5G Base-Stations using Blockchain","authors":"William B. Crowe, T. Oh","doi":"10.1109/ICSSA51305.2020.00010","DOIUrl":"https://doi.org/10.1109/ICSSA51305.2020.00010","url":null,"abstract":"5G in the United States has been rapidly growing this past year as the New Radio (NR) standards have been finalized. The top three US cellular carriers cover most major cities in 2019, and the plans are to cover most of the nation by the close of 2020. Field testing shows that 5G is meeting the promise of gigabit speeds and single digit latency over millimeter wave. 5G Security is ever so more critical with the expectation of massive IoT, M2M, VANET, and High-Speed Fixed Wireless. More devices will rely on commercially available wireless internet, it should be expected that 5G Security will be thoroughly tested by unscrupulous individuals. To enhance security, this paper will cover utilizing Blockchain for identity management of the next generation NodeB (gNB) for the user equipment (UE) would make Rogue Cellsite, man-in-the-middle-attacks, or Stingray much harder to perform. This would prevent the UE from blindly connecting to any gNB it sees and sharing sensitive information because of the connection requested from an untrusted source. While there are other potential security flaws in 5G, implementing Blockchain in a commercial network would enhance attach and handover security for all devices that use 5G.","PeriodicalId":346706,"journal":{"name":"2020 International Conference on Software Security and Assurance (ICSSA)","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133716877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security Analysis of SOHO Wi-Fi routers SOHO Wi-Fi路由器的安全性分析
Pub Date : 2020-10-01 DOI: 10.1109/ICSSA51305.2020.00020
Sandeep Romana, Jyostna Grandhi, P. R. L. Eswari
Wi-Fi-enabled Small Office/Home Office (SOHO) routers have become ubiquitous for having internet access in many network environments. With the advent of the ‘Internet of Things’ (IoT) and smart devices, almost all household devices are connected to the internet via these Wi-Fi-enabled SOHO routers. There have been numerous reports of security issues in SOHO routers because of known vulnerabilities. Except for enterprise networks, these devices acting as gateways are rarely safeguarded properly. The reasons for neglecting the security of these devices are many. Reports suggest that users often deploy these devices with insecure default configurations, leaving them as easy prey in the hands of malice users. Due to the easy exploitability, these devices have become attackers' paradise. The security analysis of these devices is often overlooked and challenging to undertake because of various versions of custom Linux based firmware and bootloaders they use. The security analysis of these devices holds strategic importance as they act as a gateway to almost every household having access to the internet. In this paper, we list the software and hardware interfaces of SOHO routers which are important for security analysis. We present a network environment for carrying out the security analysis of these devices. An iterative approach using static & dynamic analysis is described. Further, the static & dynamic analysis is augmented with symbolic analysis. To validate the described procedures, we present the case study of performing security analysis on a Netis WF2411 router.
在许多网络环境中,支持wi - fi的小型办公室/家庭办公室(SOHO)路由器已经变得无处不在。随着“物联网”(IoT)和智能设备的出现,几乎所有的家用设备都通过这些支持wi - fi的SOHO路由器连接到互联网。由于已知的漏洞,已经有许多关于SOHO路由器安全问题的报告。除了企业网络,这些作为网关的设备很少得到适当的保护。忽视这些设备的安全性的原因有很多。报告显示,用户通常使用不安全的默认配置部署这些设备,使它们很容易落入恶意用户的手中。由于易被利用,这些设备已经成为攻击者的天堂。这些设备的安全性分析经常被忽视,而且很难进行,因为它们使用的是各种版本的基于Linux的定制固件和引导加载程序。对这些设备的安全分析具有战略重要性,因为它们几乎是每个接入互联网的家庭的门户。本文列出了SOHO路由器的软件和硬件接口,这些接口对安全分析很重要。我们提出了一个对这些设备进行安全分析的网络环境。描述了一种使用静态和动态分析的迭代方法。进一步,通过符号分析增强了静态和动态分析。为了验证所描述的过程,我们提出了在Netis WF2411路由器上执行安全分析的案例研究。
{"title":"Security Analysis of SOHO Wi-Fi routers","authors":"Sandeep Romana, Jyostna Grandhi, P. R. L. Eswari","doi":"10.1109/ICSSA51305.2020.00020","DOIUrl":"https://doi.org/10.1109/ICSSA51305.2020.00020","url":null,"abstract":"Wi-Fi-enabled Small Office/Home Office (SOHO) routers have become ubiquitous for having internet access in many network environments. With the advent of the ‘Internet of Things’ (IoT) and smart devices, almost all household devices are connected to the internet via these Wi-Fi-enabled SOHO routers. There have been numerous reports of security issues in SOHO routers because of known vulnerabilities. Except for enterprise networks, these devices acting as gateways are rarely safeguarded properly. The reasons for neglecting the security of these devices are many. Reports suggest that users often deploy these devices with insecure default configurations, leaving them as easy prey in the hands of malice users. Due to the easy exploitability, these devices have become attackers' paradise. The security analysis of these devices is often overlooked and challenging to undertake because of various versions of custom Linux based firmware and bootloaders they use. The security analysis of these devices holds strategic importance as they act as a gateway to almost every household having access to the internet. In this paper, we list the software and hardware interfaces of SOHO routers which are important for security analysis. We present a network environment for carrying out the security analysis of these devices. An iterative approach using static & dynamic analysis is described. Further, the static & dynamic analysis is augmented with symbolic analysis. To validate the described procedures, we present the case study of performing security analysis on a Netis WF2411 router.","PeriodicalId":346706,"journal":{"name":"2020 International Conference on Software Security and Assurance (ICSSA)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114055345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Document Representations to Improve Topic Modelling 改进主题建模的文档表示
Pub Date : 2020-10-01 DOI: 10.2139/ssrn.3733546
P. V. Poojitha, R. Menon
Each and every day we are collecting lots of information from web applications. So it is difficult to understand or detect what the whole information is all about. To detect, understand and summarise the whole information we need some specific tools and techniques like topic modelling which helps to analyze and identify the crisp of the data. This paper implements the sparsity based document representation to improve Topic Modeling, it organizes the data with meaningful structure by using machine learning algorithms like LDA(Latent Dirichlet Allocation) and OMP(Orthogonal Matching Pursuit) algorithms. It identifies a documents belongs to which topic as well as similarity between documents in an existing dictionary. The OMP(Orthogonal Matching Pursuit) algorithm is the best algorithm for sparse approximation With better accuracy. OMP(Orthogonal Matching Pursuit) algorithm can identify the topics to which the input document[Y] is mostly related to across a large collection of text documents present in a dictionary.
我们每天都在从网络应用程序中收集大量的信息。因此,很难理解或检测到整个信息的全部内容。为了检测、理解和总结整个信息,我们需要一些特定的工具和技术,如主题建模,这有助于分析和识别数据的清晰度。本文实现了基于稀疏度的文档表示来改进主题建模,利用LDA(Latent Dirichlet Allocation)和OMP(Orthogonal Matching Pursuit)算法等机器学习算法,将数据组织成有意义的结构。它标识文档属于哪个主题,以及现有字典中文档之间的相似性。正交匹配追踪(OMP)算法是稀疏逼近的最佳算法,具有较好的精度。OMP(正交匹配追踪)算法可以在字典中存在的大量文本文档中识别与输入文档[Y]最相关的主题。
{"title":"Document Representations to Improve Topic Modelling","authors":"P. V. Poojitha, R. Menon","doi":"10.2139/ssrn.3733546","DOIUrl":"https://doi.org/10.2139/ssrn.3733546","url":null,"abstract":"Each and every day we are collecting lots of information from web applications. So it is difficult to understand or detect what the whole information is all about. To detect, understand and summarise the whole information we need some specific tools and techniques like topic modelling which helps to analyze and identify the crisp of the data. This paper implements the sparsity based document representation to improve Topic Modeling, it organizes the data with meaningful structure by using machine learning algorithms like LDA(Latent Dirichlet Allocation) and OMP(Orthogonal Matching Pursuit) algorithms. It identifies a documents belongs to which topic as well as similarity between documents in an existing dictionary. The OMP(Orthogonal Matching Pursuit) algorithm is the best algorithm for sparse approximation With better accuracy. OMP(Orthogonal Matching Pursuit) algorithm can identify the topics to which the input document[Y] is mostly related to across a large collection of text documents present in a dictionary.","PeriodicalId":346706,"journal":{"name":"2020 International Conference on Software Security and Assurance (ICSSA)","volume":"29 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114126784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparison of various interpolation techniques to infer localization of audio files using ENF signals 使用ENF信号推断音频文件定位的各种插值技术的比较
Pub Date : 2020-10-01 DOI: 10.1109/ICSSA51305.2020.00015
Hye-Seung Han, KangHoon Lee, Y. Jeon, Ji-Won Yoon
Electrical Network Frequency (ENF) is a frequency of the electrical power signal of the power grid that plays a key role in the level of security. There is a difference in the values on the supply and demand on power usage. Due to its distinctive value, the ENF data hold great importance in the field of security. Examining the ENF signal makes it possible to trace the location where the ENF signal was generated. By making the most use of certain interpolation techniques, we can estimate the ENF value of a specific location and evaluate the estimated performance. Interpolating the ENF signals on the target location can increase the accuracy of the estimate for the unacquainted ENF signals. In this paper, we interpolated the ENF values of the power grid of the United States by using three different methods: IDW, Ordinary Kriging, and Universal Kriging. Then we evaluated the RMSE calculated by varying the hyper-parameters and models of interpolation methods. As a result, it was found that applying the Ordinary Kriging in the Western grid had the lowest RMSE. For the Eastern power grid, it was the IDW with λ=−1 which showed the lowest RMSE. We concluded that each power grid had different characteristics. Therefore different interpolation techniques should be applied to each case for precise approximation.
电网频率(ENF)是电网电力信号的频率,对电网的安全水平起着关键作用。在电力使用的供应和需求值上存在差异。由于其独特的价值,ENF数据在安全领域有着重要的意义。检查ENF信号使跟踪ENF信号产生的位置成为可能。通过充分利用某些插值技术,我们可以估计特定位置的ENF值并评估估计的性能。在目标位置上插值ENF信号可以提高未知ENF信号估计的精度。本文采用IDW、普通克里格和通用克里格三种方法对美国电网的ENF值进行插值。然后对不同插值方法的超参数和模型计算的均方根误差进行了评价。结果发现,在西部电网中应用普通克里格法的均方根误差最低。对于东部电网,λ=−1的IDW的均方根误差最低。我们得出结论,每个电网都有不同的特点。因此,为了得到精确的近似,每种情况都应采用不同的插值技术。
{"title":"Comparison of various interpolation techniques to infer localization of audio files using ENF signals","authors":"Hye-Seung Han, KangHoon Lee, Y. Jeon, Ji-Won Yoon","doi":"10.1109/ICSSA51305.2020.00015","DOIUrl":"https://doi.org/10.1109/ICSSA51305.2020.00015","url":null,"abstract":"Electrical Network Frequency (ENF) is a frequency of the electrical power signal of the power grid that plays a key role in the level of security. There is a difference in the values on the supply and demand on power usage. Due to its distinctive value, the ENF data hold great importance in the field of security. Examining the ENF signal makes it possible to trace the location where the ENF signal was generated. By making the most use of certain interpolation techniques, we can estimate the ENF value of a specific location and evaluate the estimated performance. Interpolating the ENF signals on the target location can increase the accuracy of the estimate for the unacquainted ENF signals. In this paper, we interpolated the ENF values of the power grid of the United States by using three different methods: IDW, Ordinary Kriging, and Universal Kriging. Then we evaluated the RMSE calculated by varying the hyper-parameters and models of interpolation methods. As a result, it was found that applying the Ordinary Kriging in the Western grid had the lowest RMSE. For the Eastern power grid, it was the IDW with λ=−1 which showed the lowest RMSE. We concluded that each power grid had different characteristics. Therefore different interpolation techniques should be applied to each case for precise approximation.","PeriodicalId":346706,"journal":{"name":"2020 International Conference on Software Security and Assurance (ICSSA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126770705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing the sovereignty and security of the Austrian internet 评估奥地利互联网的主权和安全
Pub Date : 2020-10-01 DOI: 10.1109/ICSSA51305.2020.00011
Florian Plainer, Klaus Kieseberg, Peter Kieseberg
With many people depending on the internet in their daily work lives, the question on dependencies of these services arises. This is especially true when considering services provided by critical (IT) infrastructure or linked to governmental bodies. In this work, we provide a methodology and subsequent analysis results regarding the security and nature of dependencies of important Austrian sites on other nations and (potentially vulnerable) resources. Furthermore, we added a specific sub set to the analysis, focusing on governmental sites due to their increasing importance. The results of this analysis helps with the identification of critical resources outside the original services scope, especially considering the inclusion of services from outside the European Union and/or from unknown/unofficial sites. Furthermore, we also analyse the usage of security headers and the adoption of HTTPS, allowing an estimation of the state of security of vital services.
随着许多人在日常工作生活中依赖互联网,这些服务的依赖性问题就出现了。在考虑由关键(IT)基础设施提供的服务或与政府机构相关的服务时尤其如此。在这项工作中,我们提供了一种方法和随后的分析结果,关于奥地利重要遗址对其他国家和(潜在脆弱的)资源的依赖的安全性和性质。此外,我们在分析中增加了一个特定的子集,重点关注政府网站,因为它们越来越重要。这种分析的结果有助于识别原始服务范围之外的关键资源,特别是考虑到包括来自欧盟以外和/或来自未知/非官方站点的服务。此外,我们还分析了安全标头的使用和HTTPS的采用,从而可以对重要服务的安全状态进行估计。
{"title":"Assessing the sovereignty and security of the Austrian internet","authors":"Florian Plainer, Klaus Kieseberg, Peter Kieseberg","doi":"10.1109/ICSSA51305.2020.00011","DOIUrl":"https://doi.org/10.1109/ICSSA51305.2020.00011","url":null,"abstract":"With many people depending on the internet in their daily work lives, the question on dependencies of these services arises. This is especially true when considering services provided by critical (IT) infrastructure or linked to governmental bodies. In this work, we provide a methodology and subsequent analysis results regarding the security and nature of dependencies of important Austrian sites on other nations and (potentially vulnerable) resources. Furthermore, we added a specific sub set to the analysis, focusing on governmental sites due to their increasing importance. The results of this analysis helps with the identification of critical resources outside the original services scope, especially considering the inclusion of services from outside the European Union and/or from unknown/unofficial sites. Furthermore, we also analyse the usage of security headers and the adoption of HTTPS, allowing an estimation of the state of security of vital services.","PeriodicalId":346706,"journal":{"name":"2020 International Conference on Software Security and Assurance (ICSSA)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116340085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Copyright 版权
Pub Date : 2020-10-01 DOI: 10.1109/icssa51305.2020.00003
{"title":"Copyright","authors":"","doi":"10.1109/icssa51305.2020.00003","DOIUrl":"https://doi.org/10.1109/icssa51305.2020.00003","url":null,"abstract":"","PeriodicalId":346706,"journal":{"name":"2020 International Conference on Software Security and Assurance (ICSSA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130596095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anomaly Detection to Protect Networks from Advanced Persistent Threats Using Adaptive Resonance AI Concepts 使用自适应共振AI概念进行异常检测以保护网络免受高级持续威胁
Pub Date : 2020-10-01 DOI: 10.1109/ICSSA51305.2020.00018
Syed Rizvi, T. Flock, Travis Flock, Iyonna Williams
In this paper, we will improve the Advanced Persistent Threats (APT) attack detection rate accuracy by using an artificial intelligence based anomalous intrusion detection that will be based on unsupervised learning techniques. This system will be mainly network-based with a thin layer running on the host device. We plan to mainly use an unsupervised artificial intelligence technique that utilizes Adaptive Resonance theory that will be paired with a signature-based system that will filter anomalous data and significantly improve detection rates and decrease false positive rates compared to typical anomalous intrusion detection system (IDS). If proven here, this system could be applied to future IDS and can significantly increase overall network security for an organization.
在本文中,我们将通过使用基于无监督学习技术的基于人工智能的异常入侵检测来提高高级持续威胁(APT)攻击检测率的准确性。这个系统将主要是基于网络的,在主机设备上运行一个薄层。我们计划主要使用一种利用自适应共振理论的无监督人工智能技术,该技术将与基于签名的系统配对,该系统将过滤异常数据,与典型的异常入侵检测系统(IDS)相比,显着提高检测率并降低误报率。如果在这里得到验证,该系统可以应用于未来的IDS,并且可以显着提高组织的整体网络安全性。
{"title":"Anomaly Detection to Protect Networks from Advanced Persistent Threats Using Adaptive Resonance AI Concepts","authors":"Syed Rizvi, T. Flock, Travis Flock, Iyonna Williams","doi":"10.1109/ICSSA51305.2020.00018","DOIUrl":"https://doi.org/10.1109/ICSSA51305.2020.00018","url":null,"abstract":"In this paper, we will improve the Advanced Persistent Threats (APT) attack detection rate accuracy by using an artificial intelligence based anomalous intrusion detection that will be based on unsupervised learning techniques. This system will be mainly network-based with a thin layer running on the host device. We plan to mainly use an unsupervised artificial intelligence technique that utilizes Adaptive Resonance theory that will be paired with a signature-based system that will filter anomalous data and significantly improve detection rates and decrease false positive rates compared to typical anomalous intrusion detection system (IDS). If proven here, this system could be applied to future IDS and can significantly increase overall network security for an organization.","PeriodicalId":346706,"journal":{"name":"2020 International Conference on Software Security and Assurance (ICSSA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131494745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Medical Blockchains and Privacy in Austria - Technical and Legal Aspects 奥地利的医疗区块链和隐私-技术和法律方面
Pub Date : 2020-10-01 DOI: 10.1109/ICSSA51305.2020.00009
Andreas Kolan, S. Tjoa, Peter Kieseberg
The utilization of blockchains in the medical domain has been discussed for quite some time, with multiple academic projects targeting various application domains in this field. Still, many countries feature underlying laws and regulations that make this utilization hard to impossible, especially when considering the sensitive nature of medical records. In this work we analyze the specific situation in Austria and analyse the two major regulations that need to be taken into account, the EU-wide GDPR and the Austria-specific ELGA, with respect to blockchain applications in the medical sector in Austria. Furthermore, we outline several additional key issues that need to be taken into consideration, as well as the problem of the most prominent solution, linking to external storage from the blockchain.
区块链在医疗领域的应用已经讨论了很长一段时间,有多个学术项目针对该领域的各个应用领域。然而,许多国家的基本法律和法规使得这种利用很难甚至不可能,特别是考虑到医疗记录的敏感性。在这项工作中,我们分析了奥地利的具体情况,并分析了需要考虑的两项主要法规,即欧盟范围内的GDPR和奥地利特定的ELGA,涉及奥地利医疗部门的区块链应用。此外,我们概述了需要考虑的其他几个关键问题,以及最突出的解决方案问题,即从区块链链接到外部存储。
{"title":"Medical Blockchains and Privacy in Austria - Technical and Legal Aspects","authors":"Andreas Kolan, S. Tjoa, Peter Kieseberg","doi":"10.1109/ICSSA51305.2020.00009","DOIUrl":"https://doi.org/10.1109/ICSSA51305.2020.00009","url":null,"abstract":"The utilization of blockchains in the medical domain has been discussed for quite some time, with multiple academic projects targeting various application domains in this field. Still, many countries feature underlying laws and regulations that make this utilization hard to impossible, especially when considering the sensitive nature of medical records. In this work we analyze the specific situation in Austria and analyse the two major regulations that need to be taken into account, the EU-wide GDPR and the Austria-specific ELGA, with respect to blockchain applications in the medical sector in Austria. Furthermore, we outline several additional key issues that need to be taken into consideration, as well as the problem of the most prominent solution, linking to external storage from the blockchain.","PeriodicalId":346706,"journal":{"name":"2020 International Conference on Software Security and Assurance (ICSSA)","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134029730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Study on Reflecting User Experience for Sensor-based Android IoT Services 基于传感器的Android物联网服务用户体验反映研究
Pub Date : 2020-10-01 DOI: 10.1109/ICSSA51305.2020.00021
Bo-Min Kim, J. Ahn, Hyung-Jong Kim
Smartphones are equipped with various sensors for apps with mobility services. However, the operating systems of smartphones do not provide proper authorization scheme for accessing the sensors data. In this work, we propose new scheme for limiting the access to the sensors of Android smartphones. Especially, we made use of the user preference and experience for supporting the decision of the new user of apps which are making use of the built-in sensors in Android smartphone.
智能手机配备了各种传感器,用于移动服务应用程序。然而,智能手机的操作系统并没有提供合适的授权方案来访问传感器数据。在这项工作中,我们提出了限制Android智能手机传感器访问的新方案。特别是,我们利用用户的偏好和经验来支持新用户对使用Android智能手机内置传感器的应用程序的决策。
{"title":"A Study on Reflecting User Experience for Sensor-based Android IoT Services","authors":"Bo-Min Kim, J. Ahn, Hyung-Jong Kim","doi":"10.1109/ICSSA51305.2020.00021","DOIUrl":"https://doi.org/10.1109/ICSSA51305.2020.00021","url":null,"abstract":"Smartphones are equipped with various sensors for apps with mobility services. However, the operating systems of smartphones do not provide proper authorization scheme for accessing the sensors data. In this work, we propose new scheme for limiting the access to the sensors of Android smartphones. Especially, we made use of the user preference and experience for supporting the decision of the new user of apps which are making use of the built-in sensors in Android smartphone.","PeriodicalId":346706,"journal":{"name":"2020 International Conference on Software Security and Assurance (ICSSA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125504120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 International Conference on Software Security and Assurance (ICSSA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1