首页 > 最新文献

2019 3rd Cyber Security in Networking Conference (CSNet)最新文献

英文 中文
Cloud-based Sybil Attack Detection Scheme for Connected Vehicles 基于云的网联车辆Sybil攻击检测方案
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108923
Anika Anwar, Talal Halabi, Mohammad Zulkernine
Automated and connected vehicle technologies are among the most heavily researched automotive technologies. As a part of an Intelligent Transportation System (ITS), connected vehicles provide useful information to drivers and the infrastructure to help make safer and more informed decisions. However, vehicle connectivity has made the ITS more vulnerable to security attacks that can endanger vehicle’s security as well as driver’s safety. Sybil attack is a very common attack, considered dangerous in a distributed network with no centralized authority. When launched against connected vehicles, it consists of controlling a set of vehicles with forged or fake identities to try to alter the measurements and data collected by the ITS, leading to sub-optimal decisions. In this paper, we provide a cloud-based detection scheme for connected vehicles against such an attack. Contrary to the previous distributed solutions in the literature, this paper presents a cloud-based solution that integrates a cloud-based authorization unit to authenticate legitimate nodes using symmetric cryptography and real-time location tracking. As a centralized authentication system, cloud computing is more reliable and secure in managing the vehicle as a device than any other infrastructure in the vehicular network and can provide real-time visibility. A trust evaluation approach is also integrated into the scheme to drive the decisions of the vehicles concerning potential collaborations. The performed experiment and security analysis show the efficacy of our proposed cloud-based solution in terms of detection rate, complexity and system requirements.
自动化和联网汽车技术是研究最多的汽车技术之一。作为智能交通系统(ITS)的一部分,联网车辆为驾驶员和基础设施提供有用的信息,帮助他们做出更安全、更明智的决策。然而,车辆连接使ITS更容易受到安全攻击,这可能危及车辆安全和驾驶员的安全。Sybil攻击是一种非常常见的攻击,在没有集中权限的分布式网络中被认为是危险的。当针对联网车辆启动时,它包括控制一组具有伪造或虚假身份的车辆,以试图改变ITS收集的测量和数据,从而导致次优决策。在本文中,我们为联网车辆提供了一种基于云的检测方案,以防止此类攻击。与文献中先前的分布式解决方案相反,本文提出了一种基于云的解决方案,该解决方案集成了基于云的授权单元,使用对称加密和实时位置跟踪对合法节点进行身份验证。云计算作为一种集中认证系统,在将车辆作为设备进行管理方面,比车载网络中的任何其他基础设施都更加可靠和安全,并且可以提供实时可见性。信任评估方法也被集成到该方案中,以驱动有关潜在合作的车辆的决策。实验和安全分析表明,我们提出的基于云的解决方案在检测率、复杂性和系统需求方面是有效的。
{"title":"Cloud-based Sybil Attack Detection Scheme for Connected Vehicles","authors":"Anika Anwar, Talal Halabi, Mohammad Zulkernine","doi":"10.1109/CSNet47905.2019.9108923","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108923","url":null,"abstract":"Automated and connected vehicle technologies are among the most heavily researched automotive technologies. As a part of an Intelligent Transportation System (ITS), connected vehicles provide useful information to drivers and the infrastructure to help make safer and more informed decisions. However, vehicle connectivity has made the ITS more vulnerable to security attacks that can endanger vehicle’s security as well as driver’s safety. Sybil attack is a very common attack, considered dangerous in a distributed network with no centralized authority. When launched against connected vehicles, it consists of controlling a set of vehicles with forged or fake identities to try to alter the measurements and data collected by the ITS, leading to sub-optimal decisions. In this paper, we provide a cloud-based detection scheme for connected vehicles against such an attack. Contrary to the previous distributed solutions in the literature, this paper presents a cloud-based solution that integrates a cloud-based authorization unit to authenticate legitimate nodes using symmetric cryptography and real-time location tracking. As a centralized authentication system, cloud computing is more reliable and secure in managing the vehicle as a device than any other infrastructure in the vehicular network and can provide real-time visibility. A trust evaluation approach is also integrated into the scheme to drive the decisions of the vehicles concerning potential collaborations. The performed experiment and security analysis show the efficacy of our proposed cloud-based solution in terms of detection rate, complexity and system requirements.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124363633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Going Beyond the Blockchain Hype: In Which Cases are Blockchains Useful for IT Applications? 超越区块链炒作:区块链在哪些情况下对IT应用有用?
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108966
Nour El Madhoun, Julien Hatin, E. Bertin
Blockchain technology is today proposed as a new technical infrastructure for several types of IT applications. This interest is due to its unique property that allows two entities to perform transactions, in a very secure manner, without going through a TTP. However, a blockchain comes along a number of other intrinsic properties, which may not be suitable or beneficial in all the envisaged application cases. Consequently, we propose in this paper a decision tree to identify when a blockchain may be the appropriate technical infrastructure for a given IT application, and when another system (centralized or distributed peer-to-peer) is more adapted. This tree is based on a comparative study between the blockchain and classical "centralized and distributed peer-to-peer" systems.
今天,区块链技术被提议作为几种IT应用程序的新技术基础设施。这种兴趣是由于它的独特属性,它允许两个实体以非常安全的方式执行事务,而无需通过http。然而,区块链具有许多其他固有属性,这些属性可能并不适合或有益于所有设想的应用案例。因此,我们在本文中提出了一个决策树,以确定区块链何时可能是给定IT应用程序的适当技术基础设施,以及何时另一个系统(集中式或分布式点对点)更适合。这棵树是基于对区块链和经典的“中心化和分布式点对点”系统的比较研究。
{"title":"Going Beyond the Blockchain Hype: In Which Cases are Blockchains Useful for IT Applications?","authors":"Nour El Madhoun, Julien Hatin, E. Bertin","doi":"10.1109/CSNet47905.2019.9108966","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108966","url":null,"abstract":"Blockchain technology is today proposed as a new technical infrastructure for several types of IT applications. This interest is due to its unique property that allows two entities to perform transactions, in a very secure manner, without going through a TTP. However, a blockchain comes along a number of other intrinsic properties, which may not be suitable or beneficial in all the envisaged application cases. Consequently, we propose in this paper a decision tree to identify when a blockchain may be the appropriate technical infrastructure for a given IT application, and when another system (centralized or distributed peer-to-peer) is more adapted. This tree is based on a comparative study between the blockchain and classical \"centralized and distributed peer-to-peer\" systems.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125684257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient Block replication to optimize the blockchain resources 高效块复制,优化区块链资源
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108973
El-hacen Diallo, Alexandre Laubé, K. A. Agha, Steven Martin
Blockchain is a great tool that provides a scalable data ledger ensuring integrity of the registered data. The validation of the blocks integrated in the blockchain can be fully distributed using a voting mechanism. This article proposes to use the blockchain as a distributed database to store information in different nodes of an ad hoc network. The main issue resides in the volume of resources needed to validate and store the blocks. We propose a distributed blockchain with k resiliency, instead of a full replication, over the nodes to reduce the overall used memory and bandwidth while providing robustness through data duplication.
区块链是一个很好的工具,它提供了一个可扩展的数据分类账,确保了注册数据的完整性。集成在区块链中的区块验证可以使用投票机制完全分布式。本文建议使用区块链作为分布式数据库,在自组织网络的不同节点中存储信息。主要问题在于验证和存储块所需的资源量。我们提出了一个具有k弹性的分布式区块链,而不是在节点上进行完整的复制,以减少总体使用的内存和带宽,同时通过数据复制提供鲁棒性。
{"title":"Efficient Block replication to optimize the blockchain resources","authors":"El-hacen Diallo, Alexandre Laubé, K. A. Agha, Steven Martin","doi":"10.1109/CSNet47905.2019.9108973","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108973","url":null,"abstract":"Blockchain is a great tool that provides a scalable data ledger ensuring integrity of the registered data. The validation of the blocks integrated in the blockchain can be fully distributed using a voting mechanism. This article proposes to use the blockchain as a distributed database to store information in different nodes of an ad hoc network. The main issue resides in the volume of resources needed to validate and store the blocks. We propose a distributed blockchain with k resiliency, instead of a full replication, over the nodes to reduce the overall used memory and bandwidth while providing robustness through data duplication.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"878 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130605901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CSNet 2019 Committees
Pub Date : 2019-10-01 DOI: 10.1109/csnet47905.2019.9108922
{"title":"CSNet 2019 Committees","authors":"","doi":"10.1109/csnet47905.2019.9108922","DOIUrl":"https://doi.org/10.1109/csnet47905.2019.9108922","url":null,"abstract":"","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132492808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Managing Effective Collaboration in Cybersecurity Alliances Using Social Computational Trust 利用社会计算信任管理网络安全联盟中的有效协作
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108949
A. Deljoo, R. Koning, T. Engers, L. Gommans, C. D. Laat
To enable effective collaboration, trust in the ability of an alliance member to adequately perform joined tasks is an essential element. Such trust needs to be organized, evaluated and maintained amongst all alliance members. In this paper, we present a social computational trust model (SCTM) to evaluate trust as featured by alliance members. Specifically, we consider three different distinctive trustworthiness elements: competence, benevolence ,and integrity. To evaluate the trust of a particular member, we take into account two sources of evidence as well as the context of interactions between the parties. Based on our SCTM model, we have developed an algorithm that ranks the members based on their capabilities, behavior, and integrity in the context of a task that is expected to be performed. A cybersecurity alliance case study is presented to demonstrate the applicability of the SCTM model. Experimental results from a real-world testbed are used to validate the presented SCTM model in selecting the right partner to defend against cyberattacks.
为了实现有效的协作,信任联盟成员充分执行联合任务的能力是必不可少的因素。这种信任需要在所有联盟成员之间进行组织、评估和维护。在本文中,我们提出了一个社会计算信任模型(SCTM)来评估联盟成员的信任特征。具体来说,我们考虑了三种不同的独特的可信度要素:能力、仁慈和正直。为了评估特定成员的信任,我们考虑了两种证据来源以及各方之间互动的背景。基于我们的SCTM模型,我们开发了一种算法,根据成员的能力、行为和在期望执行的任务上下文中的完整性对成员进行排名。以网络安全联盟为例,论证了SCTM模型的适用性。通过一个真实测试平台的实验结果,验证了所提出的SCTM模型在选择合适的合作伙伴来防御网络攻击方面的有效性。
{"title":"Managing Effective Collaboration in Cybersecurity Alliances Using Social Computational Trust","authors":"A. Deljoo, R. Koning, T. Engers, L. Gommans, C. D. Laat","doi":"10.1109/CSNet47905.2019.9108949","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108949","url":null,"abstract":"To enable effective collaboration, trust in the ability of an alliance member to adequately perform joined tasks is an essential element. Such trust needs to be organized, evaluated and maintained amongst all alliance members. In this paper, we present a social computational trust model (SCTM) to evaluate trust as featured by alliance members. Specifically, we consider three different distinctive trustworthiness elements: competence, benevolence ,and integrity. To evaluate the trust of a particular member, we take into account two sources of evidence as well as the context of interactions between the parties. Based on our SCTM model, we have developed an algorithm that ranks the members based on their capabilities, behavior, and integrity in the context of a task that is expected to be performed. A cybersecurity alliance case study is presented to demonstrate the applicability of the SCTM model. Experimental results from a real-world testbed are used to validate the presented SCTM model in selecting the right partner to defend against cyberattacks.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133595653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Social Consensus-inspired Aggregation Algorithms for Edge Computing 基于社会共识的边缘计算聚合算法
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108947
Firas Al-Doghman, Z. Chaczko, Wayne Brookes, L. C. Gordon
The current interest about the *nternet of Things (IoT) evokes the establishment of infinite services giving huge, active, and varied information sets. Within it, an enormous mass of heterogeneous data are generated and interchanged by billions of device which can yield to an enormous information traffic jam and affects network efficiency. To get over this issue, there’s a necessity for an effective, smart, distributed, and in-network technique that uses a cooperative effort to aggregate data along the pathway from the network edge to its sink. we tend to propose an information organization blueprint that systematizes data aggregation and transmission within the bounds of the Edge domain from the front-end until the Cloud. A social consensus technique obtained by applying statistical analysis is employed within the blueprint to get and update a policy concerning a way to aggregate and transmit data according to the order of information consumption inside the network. The Propose technique, consensus Aggregation, uses statistical Machine Learning to consolidate the approach and appraise its performance. inside the normal operation of the approach, data aggregation is performed with the utilization of data distribution. A notable information delivery efficiency was obtained with a nominal loss in precision as the blueprint was tested inside a particular environment as a case study. The conclusion of the strategy showed that the consensus approach overcome the individual ones in several directions.
当前人们对物联网(IoT)的兴趣唤起了无限服务的建立,提供了巨大的、活跃的、多样的信息集。在网络中,数十亿台设备产生和交换的海量异构数据可能造成巨大的信息堵塞,影响网络效率。为了解决这个问题,需要一种有效的、智能的、分布式的、网络内的技术,这种技术通过协作来沿着从网络边缘到其接收器的路径聚合数据。我们倾向于提出一种信息组织蓝图,将边缘域范围内从前端到云的数据聚合和传输系统化。在蓝图中采用统计分析获得的社会共识技术,根据网络内部信息消费的顺序,获取和更新有关数据聚合和传输方式的策略。提议的技术,共识聚合,使用统计机器学习来巩固方法并评估其性能。在该方法的正常操作中,利用数据分布进行数据聚合。在作为案例研究的特定环境中对蓝图进行测试时,获得了显著的信息传递效率,但精度有一定损失。该策略的结论表明,共识方法在几个方面克服了个别方法。
{"title":"Social Consensus-inspired Aggregation Algorithms for Edge Computing","authors":"Firas Al-Doghman, Z. Chaczko, Wayne Brookes, L. C. Gordon","doi":"10.1109/CSNet47905.2019.9108947","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108947","url":null,"abstract":"The current interest about the *nternet of Things (IoT) evokes the establishment of infinite services giving huge, active, and varied information sets. Within it, an enormous mass of heterogeneous data are generated and interchanged by billions of device which can yield to an enormous information traffic jam and affects network efficiency. To get over this issue, there’s a necessity for an effective, smart, distributed, and in-network technique that uses a cooperative effort to aggregate data along the pathway from the network edge to its sink. we tend to propose an information organization blueprint that systematizes data aggregation and transmission within the bounds of the Edge domain from the front-end until the Cloud. A social consensus technique obtained by applying statistical analysis is employed within the blueprint to get and update a policy concerning a way to aggregate and transmit data according to the order of information consumption inside the network. The Propose technique, consensus Aggregation, uses statistical Machine Learning to consolidate the approach and appraise its performance. inside the normal operation of the approach, data aggregation is performed with the utilization of data distribution. A notable information delivery efficiency was obtained with a nominal loss in precision as the blueprint was tested inside a particular environment as a case study. The conclusion of the strategy showed that the consensus approach overcome the individual ones in several directions.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"876 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134218703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phishing Attacks: Detecting and Preventing Infected E-mails Using Machine Learning Methods 网络钓鱼攻击:使用机器学习方法检测和防止受感染的电子邮件
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108961
Diego Oña, Lenín Zapata, Walter Fuertes, Germán E. Rodríguez, Eduardo Benavides, T. Toulkeridis
The main aim of the current study has been to provide a novel tool for detecting phishing attacks and finding a solution to counteract such types of threats. In this article we describe the process of how to develop a Scrum-based implementation of algorithms for automatic learning, Feature Selection and Neural Networks. This tool has the ability to detect and mitigate a phishing attack registered inside the e-mail server. For the validation of the obtained results, we have used the source of information of blacklist of PhishTank, which is a collaborative clearing house for data and information about phishing on the Internet. The conducted proof of concept demonstrated that the implemented feature selection algorithm discards the irrelevant characteristics of electronic mail and, that the neural network algorithm adopts these characteristics, establishing an optimal level of learning without redundancies. It also reveals the functionality of the proposed solution.
当前研究的主要目的是提供一种检测网络钓鱼攻击的新工具,并找到对抗此类威胁的解决方案。在本文中,我们描述了如何开发基于scrum的自动学习、特征选择和神经网络算法的实现过程。此工具能够检测并减轻在电子邮件服务器内注册的网络钓鱼攻击。为了验证所获得的结果,我们使用了PhishTank的黑名单信息来源,这是一个关于互联网上网络钓鱼的数据和信息的协作交换所。所进行的概念验证表明,所实现的特征选择算法抛弃了电子邮件的不相关特征,神经网络算法采用了这些特征,建立了无冗余的最佳学习水平。它还揭示了所建议的解决方案的功能。
{"title":"Phishing Attacks: Detecting and Preventing Infected E-mails Using Machine Learning Methods","authors":"Diego Oña, Lenín Zapata, Walter Fuertes, Germán E. Rodríguez, Eduardo Benavides, T. Toulkeridis","doi":"10.1109/CSNet47905.2019.9108961","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108961","url":null,"abstract":"The main aim of the current study has been to provide a novel tool for detecting phishing attacks and finding a solution to counteract such types of threats. In this article we describe the process of how to develop a Scrum-based implementation of algorithms for automatic learning, Feature Selection and Neural Networks. This tool has the ability to detect and mitigate a phishing attack registered inside the e-mail server. For the validation of the obtained results, we have used the source of information of blacklist of PhishTank, which is a collaborative clearing house for data and information about phishing on the Internet. The conducted proof of concept demonstrated that the implemented feature selection algorithm discards the irrelevant characteristics of electronic mail and, that the neural network algorithm adopts these characteristics, establishing an optimal level of learning without redundancies. It also reveals the functionality of the proposed solution.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128711568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
TAG: Topological Attack Graph Analysis Tool 标签:拓扑攻击图分析工具
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108979
M. Malowidzki, Damian Hermanowski, P. Berezinski
Attack graphs are a relatively new – at least, from the point of view of a practical usage – method for modeling multistage cyber-attacks. They allow to understand how seemingly unrelated vulnerabilities may be combined together by an attacker to form a chain of hostile actions that enable to compromise a key resource. An attack graph is also the starting point for providing recommendations for corrective actions that would fix or mask security problems and prevent the attacks. In the paper, we propose TAG, a topological attack graph analysis tool designed to support a user in a security evaluation and countermeasure selection. TAG employs an improved version of MulVAL inference engine, estimates a security level on the basis of attack graph and attack paths scoring, and recommends remedial actions that improve the security of the analyzed system.
攻击图是一种相对较新的——至少,从实际使用的角度来看——建模多阶段网络攻击的方法。它们可以让我们了解攻击者如何将看似无关的漏洞组合在一起,形成一系列敌对行动,从而危及关键资源。攻击图也是为纠正措施提供建议的起点,这些措施可以修复或掩盖安全问题并防止攻击。在本文中,我们提出了一个拓扑攻击图分析工具TAG,旨在支持用户进行安全评估和对策选择。TAG采用改进版本的MulVAL推理引擎,根据攻击图和攻击路径评分估计安全级别,并建议改进措施,提高被分析系统的安全性。
{"title":"TAG: Topological Attack Graph Analysis Tool","authors":"M. Malowidzki, Damian Hermanowski, P. Berezinski","doi":"10.1109/CSNet47905.2019.9108979","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108979","url":null,"abstract":"Attack graphs are a relatively new – at least, from the point of view of a practical usage – method for modeling multistage cyber-attacks. They allow to understand how seemingly unrelated vulnerabilities may be combined together by an attacker to form a chain of hostile actions that enable to compromise a key resource. An attack graph is also the starting point for providing recommendations for corrective actions that would fix or mask security problems and prevent the attacks. In the paper, we propose TAG, a topological attack graph analysis tool designed to support a user in a security evaluation and countermeasure selection. TAG employs an improved version of MulVAL inference engine, estimates a security level on the basis of attack graph and attack paths scoring, and recommends remedial actions that improve the security of the analyzed system.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115439278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey 5G无线网络物理层安全:综合调查
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108955
José David Vega Sánchez, L. Urquiza-Aguiar, M. C. Paredes
Physical-layer security is emerging approach that can benefit conventional encryption methods. The main idea of physical layer security is to take advantage of the features of the wireless channel and its impairments in order to ensure secure communication in the physical layer. This paper provides a comprehensive review of information-theoretic measures of the secrecy performance in physical layer security. In addition, our work survey research about physical layer security over several enabling 5G technologies, such as massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, and full-duplex, including the key concepts of each of the aforementioned technologies. Finally, future research directions and technical challenges of physical layer security are identified.
物理层安全是一种新兴的方法,它可以使传统的加密方法受益。物理层安全的主要思想是利用无线信道的特性及其缺陷来保证物理层通信的安全。本文综述了物理层安全中保密性能的信息论度量方法。此外,我们的工作调查了几种使能5G技术(如大规模多输入多输出、毫米波通信、异构网络和全双工)的物理层安全性研究,包括上述每种技术的关键概念。最后指出了物理层安全的未来研究方向和技术挑战。
{"title":"Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey","authors":"José David Vega Sánchez, L. Urquiza-Aguiar, M. C. Paredes","doi":"10.1109/CSNet47905.2019.9108955","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108955","url":null,"abstract":"Physical-layer security is emerging approach that can benefit conventional encryption methods. The main idea of physical layer security is to take advantage of the features of the wireless channel and its impairments in order to ensure secure communication in the physical layer. This paper provides a comprehensive review of information-theoretic measures of the secrecy performance in physical layer security. In addition, our work survey research about physical layer security over several enabling 5G technologies, such as massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, and full-duplex, including the key concepts of each of the aforementioned technologies. Finally, future research directions and technical challenges of physical layer security are identified.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123748749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Hashing-based authentication for CAN bus and application to Denial-of-Service protection 基于哈希的CAN总线认证及其在拒绝服务防护中的应用
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108978
O. Cros, Gabriel Chênevert
The Controller Area Network (CAN) bus is an embedded network infrastructure especially used in automotive and aerospace contexts. It is well-known for its reliability but, due to historical and architectural reasons, authentication solutions were not integrated in the protocol itself. In particular, it does not integrate solutions of protection against external attackers. This can lead to data transitting through the network without any identity control and can quickly lead to backdoors allowing external attackers to take control of a vehicle, even while driving. Authentication solutions exist for CAN, but are often based on additional protocol layers or consume too much resources. The point of this paper is to propose an authentication solution in CAN based on a hashing mechanism that could be integrated in CAN standard protocol.
控制器区域网络(CAN)总线是一种嵌入式网络基础设施,特别用于汽车和航空航天环境。它以其可靠性而闻名,但是由于历史和体系结构的原因,身份验证解决方案没有集成到协议本身中。特别是,它没有集成针对外部攻击者的保护解决方案。这可能导致数据在没有任何身份控制的情况下通过网络传输,并可能很快导致后门允许外部攻击者控制车辆,即使在行驶中也是如此。存在CAN的身份验证解决方案,但通常基于额外的协议层或消耗太多资源。本文的重点是提出一种基于哈希机制的CAN认证解决方案,该方案可以集成到CAN标准协议中。
{"title":"Hashing-based authentication for CAN bus and application to Denial-of-Service protection","authors":"O. Cros, Gabriel Chênevert","doi":"10.1109/CSNet47905.2019.9108978","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108978","url":null,"abstract":"The Controller Area Network (CAN) bus is an embedded network infrastructure especially used in automotive and aerospace contexts. It is well-known for its reliability but, due to historical and architectural reasons, authentication solutions were not integrated in the protocol itself. In particular, it does not integrate solutions of protection against external attackers. This can lead to data transitting through the network without any identity control and can quickly lead to backdoors allowing external attackers to take control of a vehicle, even while driving. Authentication solutions exist for CAN, but are often based on additional protocol layers or consume too much resources. The point of this paper is to propose an authentication solution in CAN based on a hashing mechanism that could be integrated in CAN standard protocol.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116421782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2019 3rd Cyber Security in Networking Conference (CSNet)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1