首页 > 最新文献

2014 Ninth Asia Joint Conference on Information Security最新文献

英文 中文
Detection of DDoS Backscatter Based on Traffic Features of Darknet TCP Packets 基于暗网TCP报文流量特征的DDoS反向散射检测
Pub Date : 2014-09-01 DOI: 10.1109/AsiaJCIS.2014.23
Nobuaki Furutani, Tao Ban, J. Nakazato, Jumpei Shimamura, Jun Kitazono, S. Ozawa
In this work, we propose a method to discriminate backscatter caused by DDoS attacks from normal traffic. Since DDoS attacks are imminent threats which could give serious economic damages to private companies and public organizations, it is quite important to detect DDoS backscatter as early as possible. To do this, 11 features of port/IP information are defined for network packets which are sent within a short time, and these features of packet traffic are classified by Suppurt Vector Machine (SVM). In the experiments, we use TCP packets for the evaluation because they include control flags (e.g. SYN-ACK, RST-ACK, RST, ACK) which can give label information (i.e. Backscatter or non-backscatter). We confirm that the proposed method can discriminate DDoS backscatter correctly from unknown dark net TCP packets with more than 90% accuracy.
在这项工作中,我们提出了一种区分DDoS攻击和正常流量引起的反向散射的方法。由于DDoS攻击是迫在眉睫的威胁,可能会给私营企业和公共机构造成严重的经济损失,因此尽早发现DDoS反向散射非常重要。为此,对短时间内发送的网络数据包定义了端口/IP信息的11个特征,并利用支持向量机(support Vector Machine, SVM)对这些数据包流量特征进行分类。在实验中,我们使用TCP数据包进行评估,因为它们包含控制标志(例如SYN-ACK, RST-ACK, RST, ACK),可以提供标签信息(即反向散射或非反向散射)。实验结果表明,该方法能够正确区分DDoS反向散射和未知暗网TCP数据包,准确率超过90%。
{"title":"Detection of DDoS Backscatter Based on Traffic Features of Darknet TCP Packets","authors":"Nobuaki Furutani, Tao Ban, J. Nakazato, Jumpei Shimamura, Jun Kitazono, S. Ozawa","doi":"10.1109/AsiaJCIS.2014.23","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2014.23","url":null,"abstract":"In this work, we propose a method to discriminate backscatter caused by DDoS attacks from normal traffic. Since DDoS attacks are imminent threats which could give serious economic damages to private companies and public organizations, it is quite important to detect DDoS backscatter as early as possible. To do this, 11 features of port/IP information are defined for network packets which are sent within a short time, and these features of packet traffic are classified by Suppurt Vector Machine (SVM). In the experiments, we use TCP packets for the evaluation because they include control flags (e.g. SYN-ACK, RST-ACK, RST, ACK) which can give label information (i.e. Backscatter or non-backscatter). We confirm that the proposed method can discriminate DDoS backscatter correctly from unknown dark net TCP packets with more than 90% accuracy.","PeriodicalId":354543,"journal":{"name":"2014 Ninth Asia Joint Conference on Information Security","volume":"1969 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129980181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Anonymous Credential Scheme Supporting Active Revocation 支持主动撤销的匿名凭证方案
Pub Date : 2014-09-01 DOI: 10.1109/AsiaJCIS.2014.17
Chun-I Fan, Chien-Nan Wu, Jen-Chun Hsu, Yi-Fan Tseng, Wen-Tsuen Chen
With the rapid development of electronic commerce, digital credentials are used with increasing frequency. Today users employing digital credentials not only complete the identity authentication process and obtain service, but also attach importance to their anonymity with the concept of privacy protection that is being rapidly developed. For this reason, anonymous credential mechanisms are being increasingly studied. However, while anonymous credentials provide privacy protection for users, the question of how to manage the credentials is a problem for issuers and service providers. In recent years, many literatures have proposed that the revocation list is a challenge to effectively implement, while users and credential consumers receive the corresponding revocation list with massive computational costs. In this paper, we present an improved anonymous credential revocation mechanism in which we examine how users not only provide passive revocation management but must spend considerable time in computational terms. We distribute the permission of revocation to the issuer and the service provider. The revocation phase can be executed only if both issuer and service provider permit, so users are not afraid that the issuer or service provider will access their private information. In addition, the issuer and the service provider can also manage illegal users. Consequently, online service systems can be more widely used. Further, we add a mechanism of time-revocation, which sets a time limit on the revocability of the anonymous credentials. This capability enables the issuer to more effectively manage the revocation phase.
随着电子商务的快速发展,数字证书的使用越来越频繁。如今,使用数字凭证的用户在完成身份认证过程并获得服务的同时,随着隐私保护理念的迅速发展,他们也开始重视自己的匿名性。出于这个原因,匿名凭证机制正在得到越来越多的研究。然而,尽管匿名凭证为用户提供了隐私保护,但如何管理凭证的问题是发行者和服务提供者面临的一个问题。近年来,许多文献提出撤销列表是一个难以有效实现的挑战,而用户和凭证消费者接收相应的撤销列表具有巨大的计算成本。在本文中,我们提出了一种改进的匿名证书吊销机制,其中我们研究了用户如何不仅提供被动吊销管理,而且必须在计算方面花费大量时间。我们将撤销许可分发给发行者和服务提供者。只有在发行者和服务提供者都允许的情况下才能执行撤销阶段,这样用户就不用担心发行者或服务提供者会访问他们的私人信息。此外,发行者和服务提供商还可以管理非法用户。因此,在线服务系统可以得到更广泛的应用。此外,我们还添加了时间撤销机制,该机制为匿名凭证的可撤销性设置了时间限制。此功能使颁发者能够更有效地管理撤销阶段。
{"title":"Anonymous Credential Scheme Supporting Active Revocation","authors":"Chun-I Fan, Chien-Nan Wu, Jen-Chun Hsu, Yi-Fan Tseng, Wen-Tsuen Chen","doi":"10.1109/AsiaJCIS.2014.17","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2014.17","url":null,"abstract":"With the rapid development of electronic commerce, digital credentials are used with increasing frequency. Today users employing digital credentials not only complete the identity authentication process and obtain service, but also attach importance to their anonymity with the concept of privacy protection that is being rapidly developed. For this reason, anonymous credential mechanisms are being increasingly studied. However, while anonymous credentials provide privacy protection for users, the question of how to manage the credentials is a problem for issuers and service providers. In recent years, many literatures have proposed that the revocation list is a challenge to effectively implement, while users and credential consumers receive the corresponding revocation list with massive computational costs. In this paper, we present an improved anonymous credential revocation mechanism in which we examine how users not only provide passive revocation management but must spend considerable time in computational terms. We distribute the permission of revocation to the issuer and the service provider. The revocation phase can be executed only if both issuer and service provider permit, so users are not afraid that the issuer or service provider will access their private information. In addition, the issuer and the service provider can also manage illegal users. Consequently, online service systems can be more widely used. Further, we add a mechanism of time-revocation, which sets a time limit on the revocability of the anonymous credentials. This capability enables the issuer to more effectively manage the revocation phase.","PeriodicalId":354543,"journal":{"name":"2014 Ninth Asia Joint Conference on Information Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134514692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
METRO: Measurement of End-to-End Route Trust METRO:端到端路由信任度量
Pub Date : 2014-09-01 DOI: 10.2197/ipsjjip.23.613
Nasato Goto, Akira Kanaoka, Masayuki Okada, E. Okamoto
Given the current situation on the Internet, it is important to determine the trust of the communication routes between a client and server. Such determination can only be established by end terminals such as clients and servers, not by intermediate routers or network providers so far. The revelations regarding PRISM and other programs highlight the importance of this issue. In this paper, a method to identify the trust level of a route between a client and a server is proposed. This method identifies the trust level using packet authentication, Probabilistic Packet Marking (PPM), and knowledge bases maintained by trusted third parties. A prototype system of the proposed method was developed and evaluated, and the evaluation results prove its feasibility. To the best of our knowledge, the proposed method is the first method to identify the trust level of a route based on information obtained from intermediate routers or Autonomous Systems (ASs).
鉴于Internet上的当前情况,确定客户机和服务器之间通信路由的信任是很重要的。到目前为止,这种决定只能由客户机和服务器等终端来确定,而不能由中间路由器或网络提供商来确定。棱镜计划和其他项目的曝光凸显了这个问题的重要性。本文提出了一种识别客户端和服务器之间路由信任级别的方法。该方法使用包认证、概率包标记(PPM)和受信任第三方维护的知识库来标识信任级别。开发并评价了该方法的原型系统,评价结果证明了该方法的可行性。据我们所知,该方法是基于从中间路由器或自治系统(as)获得的信息来确定路由信任级别的第一种方法。
{"title":"METRO: Measurement of End-to-End Route Trust","authors":"Nasato Goto, Akira Kanaoka, Masayuki Okada, E. Okamoto","doi":"10.2197/ipsjjip.23.613","DOIUrl":"https://doi.org/10.2197/ipsjjip.23.613","url":null,"abstract":"Given the current situation on the Internet, it is important to determine the trust of the communication routes between a client and server. Such determination can only be established by end terminals such as clients and servers, not by intermediate routers or network providers so far. The revelations regarding PRISM and other programs highlight the importance of this issue. In this paper, a method to identify the trust level of a route between a client and a server is proposed. This method identifies the trust level using packet authentication, Probabilistic Packet Marking (PPM), and knowledge bases maintained by trusted third parties. A prototype system of the proposed method was developed and evaluated, and the evaluation results prove its feasibility. To the best of our knowledge, the proposed method is the first method to identify the trust level of a route based on information obtained from intermediate routers or Autonomous Systems (ASs).","PeriodicalId":354543,"journal":{"name":"2014 Ninth Asia Joint Conference on Information Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126543712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parity Detection for Some Three-Modulus Residue Number System 一类三模剩余数系统的奇偶检测
Pub Date : 2014-09-01 DOI: 10.1109/AsiaJCIS.2014.13
D. Guan, Yu-Shan Cheng
In this paper, we present a parity detection algorithm for residue number system using three-modulus set {2p -- 1, 2p + 1, 2p2 -- 1}, where p is a positive integer. Given residue number system representation of X = (x1, x2, x3) where x1 = X mod 2p-1, x2 = X mod 2p+1, x3 = X mod 2p2 -- 1. We show that the parity of X can be computed by (x1 + x2 + x3 + G (d) mod 2, where d = p (x2 -- x1) + (2x3 -- x1 -- x2), G (d) = 1, if d > 2 (2p2 -- 1) or d <; 0, otherwise, G(d) = 0.
本文利用三模集{2p—1,2p + 1,2p2—1}给出了残数系统的奇偶检测算法,其中p为正整数。给定X = (x1, x2, x3)的剩数系统表示,其中x1 = X mod 2p-1, x2 = X mod 2p+1, x3 = X mod 2p2 -1。我们证明了X的奇偶性可以用(x1 + x2 + x3 + G (d) mod 2来计算,其中d = p (x2—x1) + (2x3—x1—x2), G (d) = 1,如果d > 2 (2p2—1)或d <;0,否则G(d) = 0。
{"title":"Parity Detection for Some Three-Modulus Residue Number System","authors":"D. Guan, Yu-Shan Cheng","doi":"10.1109/AsiaJCIS.2014.13","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2014.13","url":null,"abstract":"In this paper, we present a parity detection algorithm for residue number system using three-modulus set {2p -- 1, 2p + 1, 2p<sup>2</sup> -- 1}, where p is a positive integer. Given residue number system representation of X = (x1, x2, x3) where x1 = X mod 2p-1, x2 = X mod 2p+1, x<sub>3</sub> = X mod 2p<sup>2</sup> -- 1. We show that the parity of X can be computed by (x1 + x2 + x<sub>3</sub> + G (d) mod 2, where d = p (x2 -- x1) + (2x<sub>3</sub> -- x1 -- x2), G (d) = 1, if d > 2 (2p<sup>2</sup> -- 1) or d <; 0, otherwise, G(d) = 0.","PeriodicalId":354543,"journal":{"name":"2014 Ninth Asia Joint Conference on Information Security","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115609480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Strongly Privacy-Preserving Communication Protocol for VANETs 面向vanet的强隐私保护通信协议
Pub Date : 2014-09-01 DOI: 10.1109/AsiaJCIS.2014.24
Chun-I Fan, Wei Sun, Shih-Wei Huang, Wen-Shenq Juang, Jheng-Jia Huang
Vehicular ad hoc networks (VANETs) are advanced instances of mobile ad hoc networks with the aim of enhancing the safety and efficiency of road traffic. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. Traffic accident notifications) to other vehicles and remind drivers to change their routes immediately or slow down to avoid dangers. However, some concerns on security and privacy are also raised in this environment. Messages should be signed and verified before they are trusted while the real identities of vehicles should not be revealed to guarantee source privacy, but they must be still traceable when VANETs were abused (e.g. Sending a fake message). Many related works have been presented in the literature so far. They can be generally divided into two constructions, where one is based on pseudonymous authentication and the other is based on group signatures. However, both of the two constructions have some drawbacks. In a pseudonymous-authentication-based scheme, a large revocation list is usually transmitted among vehicles. A group-signature-based scheme needs a large amount of computations for revocation checking. Furthermore, most of the previous schemes cannot support privacy preservation between roadside units (RSUs) and vehicles. Consequently, in this paper, we come up with a provably secure and strong privacy preserving protocol based on the blind signature technique to guarantee privacy and fulfill other essential security requirements in the vehicular communication environment. Furthermore, compared with other similar works, we offer an efficient tracing mechanism to trace and revoke the vehicles which abused the VANETs. Finally, we provide security analysis to show that our proposed scheme is secure.
车辆自组织网络(vanet)是移动自组织网络的高级实例,旨在提高道路交通的安全性和效率。其基本思想是允许任意车辆向其他车辆广播特别信息(例如交通事故通知),并提醒驾驶员立即改变路线或减速以避免危险。然而,在这种环境下,也提出了一些对安全和隐私的担忧。消息在被信任之前应该经过签名和验证,而车辆的真实身份不应该被泄露,以保证来源的隐私,但当vanet被滥用时(例如发送虚假消息),它们仍然必须是可追踪的。到目前为止,文献中已经有很多相关的工作。它们一般可以分为两种结构,一种是基于假名认证,另一种是基于群签名。然而,这两种结构都有一些缺点。在基于假名认证的方案中,车辆之间通常会传输大量的吊销列表。基于组签名的方案需要大量的计算来进行撤销检查。此外,以往的大多数计划都不支持路边车辆与车辆之间的隐私保护。因此,本文提出了一种基于盲签名技术的可证明安全性强的隐私保护协议,以保证车辆通信环境中的隐私和满足其他必要的安全要求。此外,与其他类似工作相比,我们提供了一种有效的跟踪机制来跟踪和撤销滥用VANETs的车辆。最后给出了安全性分析,证明了所提方案的安全性。
{"title":"Strongly Privacy-Preserving Communication Protocol for VANETs","authors":"Chun-I Fan, Wei Sun, Shih-Wei Huang, Wen-Shenq Juang, Jheng-Jia Huang","doi":"10.1109/AsiaJCIS.2014.24","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2014.24","url":null,"abstract":"Vehicular ad hoc networks (VANETs) are advanced instances of mobile ad hoc networks with the aim of enhancing the safety and efficiency of road traffic. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. Traffic accident notifications) to other vehicles and remind drivers to change their routes immediately or slow down to avoid dangers. However, some concerns on security and privacy are also raised in this environment. Messages should be signed and verified before they are trusted while the real identities of vehicles should not be revealed to guarantee source privacy, but they must be still traceable when VANETs were abused (e.g. Sending a fake message). Many related works have been presented in the literature so far. They can be generally divided into two constructions, where one is based on pseudonymous authentication and the other is based on group signatures. However, both of the two constructions have some drawbacks. In a pseudonymous-authentication-based scheme, a large revocation list is usually transmitted among vehicles. A group-signature-based scheme needs a large amount of computations for revocation checking. Furthermore, most of the previous schemes cannot support privacy preservation between roadside units (RSUs) and vehicles. Consequently, in this paper, we come up with a provably secure and strong privacy preserving protocol based on the blind signature technique to guarantee privacy and fulfill other essential security requirements in the vehicular communication environment. Furthermore, compared with other similar works, we offer an efficient tracing mechanism to trace and revoke the vehicles which abused the VANETs. Finally, we provide security analysis to show that our proposed scheme is secure.","PeriodicalId":354543,"journal":{"name":"2014 Ninth Asia Joint Conference on Information Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125229723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Parallel Modulus Operations in RSA Encryption by CPU/GPU Hybrid Computation 基于CPU/GPU混合计算的RSA加密并行模数运算
Pub Date : 2014-09-01 DOI: 10.1109/AsiaJCIS.2014.25
Chu-Hsing Lin, Jung-Chun Liu, Cheng-Chieh Li, Po-Wei Chu
This research mainly proposes a method to resolve the bottleneck of running RSA encryption algorithms on CPUs. The RSA encryption algorithm involves with the operation of large numbers. Accompanied by the enhancement of the hardware performance of computers, the RSA key length is increased for providing substantial security. To crack RSA encryption, methods based on factoring of large prime numbers are currently in use, in which GPU parallel techniques have been utilized to speed up factorization of prime numbers in recent years. However, most RSA encryptions are still performed on CPUs. To deal with the increasing speed of cracking through high speed GPU operations, the RSA key length continues to increase and so does the cost of RSA encryption. Presently many researches of RSA encryptions are based on the Montgomery algorithm, in which operations of modular multiplication are parallelized to enhance the performance, however, modulus operations are still performed on the single core CPU. In addition to use the Montgomery algorithm on CPUs to accelerate the RSA encryption algorithm, we also exploit the convolution property of the Fast Fourier Transform and the convergence of the Newton's method. As a result, cooperative heterogeneous computing for parallel processing on CPU/GPU hybrids is used to greatly enhance the encryption performance.
本研究主要提出了一种解决RSA加密算法在cpu上运行瓶颈的方法。RSA加密算法涉及到大数的运算。随着计算机硬件性能的提高,RSA密钥长度也在不断增加,以提供更大的安全性。为了破解RSA加密,目前使用的是基于大素数分解的方法,其中近年来利用GPU并行技术来加速素数分解。然而,大多数RSA加密仍然是在cpu上执行的。为了应对高速GPU运算带来的破解速度的增加,RSA密钥长度不断增加,RSA加密的成本也在不断增加。目前RSA加密的许多研究都是基于Montgomery算法,该算法将模乘法运算并行化以提高性能,但模运算仍然是在单核CPU上进行的。除了在cpu上使用Montgomery算法来加速RSA加密算法外,我们还利用了快速傅里叶变换的卷积特性和牛顿方法的收敛性。因此,采用协同异构计算在CPU/GPU混合平台上进行并行处理,大大提高了加密性能。
{"title":"Parallel Modulus Operations in RSA Encryption by CPU/GPU Hybrid Computation","authors":"Chu-Hsing Lin, Jung-Chun Liu, Cheng-Chieh Li, Po-Wei Chu","doi":"10.1109/AsiaJCIS.2014.25","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2014.25","url":null,"abstract":"This research mainly proposes a method to resolve the bottleneck of running RSA encryption algorithms on CPUs. The RSA encryption algorithm involves with the operation of large numbers. Accompanied by the enhancement of the hardware performance of computers, the RSA key length is increased for providing substantial security. To crack RSA encryption, methods based on factoring of large prime numbers are currently in use, in which GPU parallel techniques have been utilized to speed up factorization of prime numbers in recent years. However, most RSA encryptions are still performed on CPUs. To deal with the increasing speed of cracking through high speed GPU operations, the RSA key length continues to increase and so does the cost of RSA encryption. Presently many researches of RSA encryptions are based on the Montgomery algorithm, in which operations of modular multiplication are parallelized to enhance the performance, however, modulus operations are still performed on the single core CPU. In addition to use the Montgomery algorithm on CPUs to accelerate the RSA encryption algorithm, we also exploit the convolution property of the Fast Fourier Transform and the convergence of the Newton's method. As a result, cooperative heterogeneous computing for parallel processing on CPU/GPU hybrids is used to greatly enhance the encryption performance.","PeriodicalId":354543,"journal":{"name":"2014 Ninth Asia Joint Conference on Information Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126016131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Secret Sharing Scheme with Efficient Keyword Search for Cloud Storage 基于高效关键字搜索的云存储秘密共享方案
Pub Date : 2014-09-01 DOI: 10.1109/AsiaJCIS.2014.33
Hiroaki Kikuchi, Kouichi Itoh, Mebae Ushida, Yuji Yamaoka, Takanori Oikawa
Confidential data should be encrypted in out-souring services in cloud computing environment in order to minimise the risk of data revealing. There have been many schemes, classified as searchable encryption, which provides capabilities to securely search over encrypted data through keywords without decryption key. In this paper, we try to combine the technique of searchable encryption with a secret sharing scheme that allows us to retrieve the portion of confidential data without recovering data.
在云计算环境下的外包服务中,应对机密数据进行加密,以尽量减少数据泄露的风险。有许多方案被归类为可搜索加密,它提供了通过关键字安全搜索加密数据而不需要解密密钥的功能。在本文中,我们尝试将可搜索加密技术与秘密共享方案相结合,该方案允许我们在不恢复数据的情况下检索部分机密数据。
{"title":"Secret Sharing Scheme with Efficient Keyword Search for Cloud Storage","authors":"Hiroaki Kikuchi, Kouichi Itoh, Mebae Ushida, Yuji Yamaoka, Takanori Oikawa","doi":"10.1109/AsiaJCIS.2014.33","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2014.33","url":null,"abstract":"Confidential data should be encrypted in out-souring services in cloud computing environment in order to minimise the risk of data revealing. There have been many schemes, classified as searchable encryption, which provides capabilities to securely search over encrypted data through keywords without decryption key. In this paper, we try to combine the technique of searchable encryption with a secret sharing scheme that allows us to retrieve the portion of confidential data without recovering data.","PeriodicalId":354543,"journal":{"name":"2014 Ninth Asia Joint Conference on Information Security","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133519130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Defense Scheme against SIP DoS Attack in SDN Using Cloud SFW 基于云SFW的SDN下SIP DoS攻击的有效防御方案
Pub Date : 2014-09-01 DOI: 10.1109/AsiaJCIS.2014.12
Zengguang Liu, Xiaochun Yin, Hoonjae Lee
With the fast emergence of Software-Defined Networking (SDN) and Cloud SIP Fire Wall (SFW), new solution is possible to defend SIP DoS attacks in IMS core network, which is impossible in traditional telecomm network through traditional SFW. In this paper, we first analyze the security threats of SIP DoS attacks in the telecomm network. And then based on the analysis, we construct the SIP DoS attack and defense models using queue theory. Further to this, based on the models, we propose an efficient SIP DoS attack defense scheme which is using priority queue and bandwidth control method. At last, simulation was taken to analyze and verify how our defense scheme improves the performance of cloud SFW and saves bandwidth during SIP DoS attack.
随着软件定义网络(SDN)和云SIP防火墙(SFW)的迅速兴起,在IMS核心网中防御SIP DoS攻击成为可能,而传统的SFW在传统的电信网络中是无法实现的。本文首先分析了电信网络中SIP DoS攻击的安全威胁。在此基础上,利用队列理论构建了SIP DoS攻击和防御模型。在此基础上,提出了一种基于优先级队列和带宽控制的SIP DoS攻击防御方案。最后通过仿真分析和验证了我们的防御方案在SIP DoS攻击时如何提高云SFW的性能和节省带宽。
{"title":"An Efficient Defense Scheme against SIP DoS Attack in SDN Using Cloud SFW","authors":"Zengguang Liu, Xiaochun Yin, Hoonjae Lee","doi":"10.1109/AsiaJCIS.2014.12","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2014.12","url":null,"abstract":"With the fast emergence of Software-Defined Networking (SDN) and Cloud SIP Fire Wall (SFW), new solution is possible to defend SIP DoS attacks in IMS core network, which is impossible in traditional telecomm network through traditional SFW. In this paper, we first analyze the security threats of SIP DoS attacks in the telecomm network. And then based on the analysis, we construct the SIP DoS attack and defense models using queue theory. Further to this, based on the models, we propose an efficient SIP DoS attack defense scheme which is using priority queue and bandwidth control method. At last, simulation was taken to analyze and verify how our defense scheme improves the performance of cloud SFW and saves bandwidth during SIP DoS attack.","PeriodicalId":354543,"journal":{"name":"2014 Ninth Asia Joint Conference on Information Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122477671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Overview on Privacy-Preserving Profile-Matching Mechanisms in Mobile Social Networks in Proximity (MSNP) 近距离移动社交网络(MSNP)中隐私保护配置文件匹配机制研究综述
Pub Date : 2014-09-01 DOI: 10.1109/AsiaJCIS.2014.18
Yufeng Wang, Jing Xu
Recently, mobile social networking in proximity (MSNP) has gained tremendous attentions, which refers to the social interactions among physically proximate mobile users directly through the Bluetooth/WiFi interfaces on their Smartphones or other mobile devices. MSNP applications can provide users more opportunities to discover and make new social interactions within proximity area, e.g., Airports, bars or other social spots. However, users enjoy these conveniences at the cost of their growing privacy concerns. Usually, MSNP application consists of three phases. First, two users need discover each other in the neighbor-discovery phase, Second, they need compare their personal profiles in the matching phase, usually called private matching, Last, two matching users enter the interaction phase for real information exchange. In this paper, we concentrate on the privacy mechanisms in the first and second phases. In detail, two primary approaches to solving the privacy-preserving profile-based friend matching problem, are categorized and compared, including private set intersection (PSI) and vector dot product to measures the social proximity, and then, two typical schemes from those approaches are discussed respectively. Our primary goal is to summarize and analyze characteristics, challenges and future directions of the privacy-preserving profile-matching schemes in MSNP.
最近,移动近距离社交网络(mobile social networking in proximity, MSNP)引起了人们的广泛关注,它是指物理距离近的移动用户直接通过智能手机或其他移动设备上的蓝牙/WiFi接口进行的社交活动。MSNP应用程序可以为用户提供更多的机会,在邻近区域发现并进行新的社交互动,例如机场,酒吧或其他社交场所。然而,用户享受这些便利的代价是他们日益增长的隐私担忧。MSNP的应用通常包括三个阶段。首先,两个用户需要在邻居发现阶段发现对方;其次,两个用户需要在匹配阶段比较他们的个人资料,通常称为私有匹配;最后,两个匹配的用户进入交互阶段,进行真正的信息交换。在本文中,我们重点讨论了第一阶段和第二阶段的隐私机制。详细地对基于隐私保护的好友匹配问题的两种主要解决方法进行了分类和比较,包括私有集交集(PSI)和矢量点积(vector dot product)来度量社交接近度,然后分别讨论了这两种方法中的两种典型方案。我们的主要目标是总结和分析MSNP中隐私保护的轮廓匹配方案的特点、挑战和未来的发展方向。
{"title":"Overview on Privacy-Preserving Profile-Matching Mechanisms in Mobile Social Networks in Proximity (MSNP)","authors":"Yufeng Wang, Jing Xu","doi":"10.1109/AsiaJCIS.2014.18","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2014.18","url":null,"abstract":"Recently, mobile social networking in proximity (MSNP) has gained tremendous attentions, which refers to the social interactions among physically proximate mobile users directly through the Bluetooth/WiFi interfaces on their Smartphones or other mobile devices. MSNP applications can provide users more opportunities to discover and make new social interactions within proximity area, e.g., Airports, bars or other social spots. However, users enjoy these conveniences at the cost of their growing privacy concerns. Usually, MSNP application consists of three phases. First, two users need discover each other in the neighbor-discovery phase, Second, they need compare their personal profiles in the matching phase, usually called private matching, Last, two matching users enter the interaction phase for real information exchange. In this paper, we concentrate on the privacy mechanisms in the first and second phases. In detail, two primary approaches to solving the privacy-preserving profile-based friend matching problem, are categorized and compared, including private set intersection (PSI) and vector dot product to measures the social proximity, and then, two typical schemes from those approaches are discussed respectively. Our primary goal is to summarize and analyze characteristics, challenges and future directions of the privacy-preserving profile-matching schemes in MSNP.","PeriodicalId":354543,"journal":{"name":"2014 Ninth Asia Joint Conference on Information Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125071253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Detecting Advertisement Module Network Behavior with Graph Modeling 基于图建模的广告模块网络行为检测
Pub Date : 2014-09-01 DOI: 10.1109/AsiaJCIS.2014.26
Hiroki Kuzuno, Kenichi Magata
Android applications are widely used and many are 'free' applications which include advertisement (ad) modules that provide ad services and track user behavior statistics. However, these ad modules often collect users' personal information and device identification numbers along with usage statistics, which is a violation of privacy. In our analysis of 1,188 Android applications' network traffic, we identified 797 applications that included 45 previously known ad modules. We analyzed these ad modules' network behavior, and found that they have characteristic network traffic patterns for acquiring ad content, specifically images. In order to accurately differentiate between ad modules' network traffic and valid application network traffic, we propose a novel method based on the distance between network traffic graphs mapping the relationships between HTTP session data (such as HTML or Java Script). This distance describes the similarity between the sessions. Using this method, we can detect ad modules' traffic by comparing session graphs with the graphs of already known ad modules. In our evaluation, we generated 20,903 graphs of applications. We separated the application graphs into those generated by known ad modules (4,698 graphs), those we manually identified as ad modules (2,000 graphs), and standard application traffic. We then applied 1,000 graphs of known ad graphs to the other graph sets (the remaining 3,698 known ad graphs and the 2,000 manually classified ad graphs) to see how accurately they could be used to identify ad graphs. Our approach showed a 76% detection rate for known ad graphs, and a 96% detection rate for manually classified ad graphs.
Android应用程序被广泛使用,其中许多是“免费”应用程序,其中包含提供广告服务和跟踪用户行为统计的广告(ad)模块。然而,这些广告模块通常会收集用户的个人信息和设备识别码以及使用统计数据,这是对隐私的侵犯。在我们对1188个Android应用的网络流量分析中,我们发现797个应用包含45个已知的广告模块。我们分析了这些广告模块的网络行为,发现它们具有获取广告内容(特别是图像)的特征网络流量模式。为了准确区分广告模块的网络流量和有效的应用程序网络流量,我们提出了一种基于映射HTTP会话数据(如HTML或Java Script)之间关系的网络流量图之间距离的新方法。这个距离描述了会话之间的相似性。使用该方法,我们可以通过将会话图与已知广告模块的图进行比较来检测广告模块的流量。在我们的评估中,我们生成了20,903个应用程序图。我们将应用程序图分为由已知广告模块生成的图(4,698个图)、我们手动识别为广告模块的图(2,000个图)和标准应用程序流量。然后,我们将1000个已知广告图应用到其他图集(剩下的3698个已知广告图和2000个手动分类的广告图),看看它们用于识别广告图的准确性如何。我们的方法对已知广告图的检测率为76%,对手动分类的广告图的检测率为96%。
{"title":"Detecting Advertisement Module Network Behavior with Graph Modeling","authors":"Hiroki Kuzuno, Kenichi Magata","doi":"10.1109/AsiaJCIS.2014.26","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2014.26","url":null,"abstract":"Android applications are widely used and many are 'free' applications which include advertisement (ad) modules that provide ad services and track user behavior statistics. However, these ad modules often collect users' personal information and device identification numbers along with usage statistics, which is a violation of privacy. In our analysis of 1,188 Android applications' network traffic, we identified 797 applications that included 45 previously known ad modules. We analyzed these ad modules' network behavior, and found that they have characteristic network traffic patterns for acquiring ad content, specifically images. In order to accurately differentiate between ad modules' network traffic and valid application network traffic, we propose a novel method based on the distance between network traffic graphs mapping the relationships between HTTP session data (such as HTML or Java Script). This distance describes the similarity between the sessions. Using this method, we can detect ad modules' traffic by comparing session graphs with the graphs of already known ad modules. In our evaluation, we generated 20,903 graphs of applications. We separated the application graphs into those generated by known ad modules (4,698 graphs), those we manually identified as ad modules (2,000 graphs), and standard application traffic. We then applied 1,000 graphs of known ad graphs to the other graph sets (the remaining 3,698 known ad graphs and the 2,000 manually classified ad graphs) to see how accurately they could be used to identify ad graphs. Our approach showed a 76% detection rate for known ad graphs, and a 96% detection rate for manually classified ad graphs.","PeriodicalId":354543,"journal":{"name":"2014 Ninth Asia Joint Conference on Information Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117150431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2014 Ninth Asia Joint Conference on Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1