首页 > 最新文献

2014 International Carnahan Conference on Security Technology (ICCST)最新文献

英文 中文
A novel background subtraction method based on color invariants and grayscale levels 一种基于颜色不变量和灰度级的背景减法
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6987024
Lorena Guachi, G. Cocorullo, P. Corsonello, F. Frustaci, S. Perri
This paper presents a new method for background subtraction which takes advantages of using the color invariants combined with gray color. The proposed method works robustly reducing misclassified foreground objects. Gaussian mixtures are exploited for each pixel through two channels: the color invariants, which are derived from a physical model, and the gray colors obtained as a descriptor of the image. The background models update is performed using a random process selected considering that in many practical situations it is not necessary to update each background pixel model for each new frame. The novel algorithm has been compared to three state-of-the-art methods. Experimental results demonstrate the proposed method achieves a higher robustness, is less sensitive to noise and increases the number of pixel correctly classified as foreground for both indoor and outdoor video sequences.
本文提出了一种利用颜色不变量与灰度相结合的优点进行背景减法的新方法。该方法能有效地减少前景目标的误分类。通过两个通道对每个像素利用高斯混合:从物理模型导出的颜色不变量,以及作为图像描述符获得的灰色颜色。考虑到在许多实际情况下,不需要为每个新帧更新每个背景像素模型,因此采用随机过程进行背景模型更新。新算法已经与三种最先进的方法进行了比较。实验结果表明,该方法具有较强的鲁棒性,对噪声的敏感性较低,增加了室内外视频序列正确分类为前景的像素数。
{"title":"A novel background subtraction method based on color invariants and grayscale levels","authors":"Lorena Guachi, G. Cocorullo, P. Corsonello, F. Frustaci, S. Perri","doi":"10.1109/CCST.2014.6987024","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987024","url":null,"abstract":"This paper presents a new method for background subtraction which takes advantages of using the color invariants combined with gray color. The proposed method works robustly reducing misclassified foreground objects. Gaussian mixtures are exploited for each pixel through two channels: the color invariants, which are derived from a physical model, and the gray colors obtained as a descriptor of the image. The background models update is performed using a random process selected considering that in many practical situations it is not necessary to update each background pixel model for each new frame. The novel algorithm has been compared to three state-of-the-art methods. Experimental results demonstrate the proposed method achieves a higher robustness, is less sensitive to noise and increases the number of pixel correctly classified as foreground for both indoor and outdoor video sequences.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"536 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115633793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Leakage-resilient memory-based physical unclonable function using phase change material 基于泄漏弹性记忆的相变材料物理不可克隆函数
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6987047
Le Zhang, Chip-Hong Chang, A. Cabrini, G. Torelli, Z. Kong
Memory-based Physical Unclonable Function (MemPUF) emerged as a replacement for traditional key preservation primitives to overcome the susceptibility of secret keys to physical attacks. Recent experiments demonstrated that even some MemPUFs can be physically attacked by exploiting their side-channel information. In this paper, we formulate an adversary model for a prediction attack that takes advantage of the side-channel information leaked from a MemPUF. Based on this pivotal insight, we propose countermeasures to enhance the resilience of MemPUFs against such a kind of attack, and introduce a security-enhanced MemPUF design using phase change material. Our analysis demonstrated the effectiveness of our proposed scheme against the measurement-prediction attack given an adversary with certain bounded attack capability.
基于内存的物理不可克隆函数(MemPUF)作为传统密钥保存原语的替代品出现,以克服密钥对物理攻击的敏感性。最近的实验表明,即使是一些mempuf也可以通过利用其侧信道信息进行物理攻击。在本文中,我们制定了一个预测攻击的对手模型,该模型利用了从MemPUF泄露的侧信道信息。基于这一关键见解,我们提出了增强MemPUF抵御此类攻击的对策,并引入了一种使用相变材料的安全增强MemPUF设计。我们的分析证明了我们的方案对于具有一定有界攻击能力的对手的测量预测攻击的有效性。
{"title":"Leakage-resilient memory-based physical unclonable function using phase change material","authors":"Le Zhang, Chip-Hong Chang, A. Cabrini, G. Torelli, Z. Kong","doi":"10.1109/CCST.2014.6987047","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987047","url":null,"abstract":"Memory-based Physical Unclonable Function (MemPUF) emerged as a replacement for traditional key preservation primitives to overcome the susceptibility of secret keys to physical attacks. Recent experiments demonstrated that even some MemPUFs can be physically attacked by exploiting their side-channel information. In this paper, we formulate an adversary model for a prediction attack that takes advantage of the side-channel information leaked from a MemPUF. Based on this pivotal insight, we propose countermeasures to enhance the resilience of MemPUFs against such a kind of attack, and introduce a security-enhanced MemPUF design using phase change material. Our analysis demonstrated the effectiveness of our proposed scheme against the measurement-prediction attack given an adversary with certain bounded attack capability.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"306 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114280277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Bridging Gaps: An application of feature warping to online signature verification 弥合差距:特征扭曲在在线签名验证中的应用
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6986972
A. Nautsch, C. Rathgeb, C. Busch
The use of (online) signatures for the purpose of verifying a subject's identity is highly accepted within society and perceived as a noninvasive and nonthreatening biometric characteristic by most users. However, signature biometrics is typically characterized by a high intra-class variability, being influenced by several physical and emotional conditions, i.e. identity verification based on online signature biometrics represents an extremely challenging task. Online signature verification systems mainly utilize time-discrete signal processing techniques for biometric signature authorship verification. The vast majority of state-of-the-art approaches to online signature verification construct subject-specific probabilistic models during feature extraction, e.g. Gaussian Mixture Models (GMMs). Focusing on the construction of these models feature normalization turns out to be vital in order to achieve robustness against noise. In this work we propose the very first application of a feature normalization technique, referred to as Feature Warping (FW), which is well-established within the speaker recognition community, to a GMM-based online signature verification system. Experimental evaluations, which are carried out on the MCYT signature corpus, demonstrate that the presented adaptation of FW significantly improves the biometric performance of the underlying online signature verification system, achieving relative gains of approximately 47% in terms of equal error rates.
使用(在线)签名来验证受试者的身份在社会上被高度接受,并且被大多数用户认为是一种非侵入性和非威胁性的生物特征。然而,签名生物识别的典型特征是班级内的高度可变性,受到几种身体和情绪条件的影响,即基于在线签名生物识别的身份验证是一项极具挑战性的任务。在线签名验证系统主要利用时间离散信号处理技术来验证生物特征签名的作者身份。绝大多数最先进的在线签名验证方法在特征提取过程中构建特定于主题的概率模型,例如高斯混合模型(GMMs)。为了实现对噪声的鲁棒性,关注这些模型的构造特征归一化是至关重要的。在这项工作中,我们提出了特征规范化技术的第一个应用,称为特征翘曲(FW),它在说话人识别社区中得到了很好的应用,用于基于gmm的在线签名验证系统。在MCYT签名语料库上进行的实验评估表明,所提出的FW自适应方法显著提高了底层在线签名验证系统的生物识别性能,在相同错误率下实现了约47%的相对增益。
{"title":"Bridging Gaps: An application of feature warping to online signature verification","authors":"A. Nautsch, C. Rathgeb, C. Busch","doi":"10.1109/CCST.2014.6986972","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986972","url":null,"abstract":"The use of (online) signatures for the purpose of verifying a subject's identity is highly accepted within society and perceived as a noninvasive and nonthreatening biometric characteristic by most users. However, signature biometrics is typically characterized by a high intra-class variability, being influenced by several physical and emotional conditions, i.e. identity verification based on online signature biometrics represents an extremely challenging task. Online signature verification systems mainly utilize time-discrete signal processing techniques for biometric signature authorship verification. The vast majority of state-of-the-art approaches to online signature verification construct subject-specific probabilistic models during feature extraction, e.g. Gaussian Mixture Models (GMMs). Focusing on the construction of these models feature normalization turns out to be vital in order to achieve robustness against noise. In this work we propose the very first application of a feature normalization technique, referred to as Feature Warping (FW), which is well-established within the speaker recognition community, to a GMM-based online signature verification system. Experimental evaluations, which are carried out on the MCYT signature corpus, demonstrate that the presented adaptation of FW significantly improves the biometric performance of the underlying online signature verification system, achieving relative gains of approximately 47% in terms of equal error rates.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123931470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
On the effect of time efficiency in DSV under stress 应力作用下DSV时间效率的影响
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6987035
Ramón Blanco-Gonzalo, R. Sánchez-Reillo, N. Poh
One of the most promising biometric modalities suggested to secure mobile devices is dynamic signature verification. It is widely accepted by users as to sign is considered a usual action. At the time to sign documents, it happens that people tend to feel stress or discomfort, but does it influence negatively to the signature recognition? In this work several users participated in a usability evaluation signing in a common smartphone with a stylus under stress conditions. This is targeting the potential use of this kind of biometric systems in scenarios where the user may suffer a certain level of stress, such as in courts, banks or even shopping. We have focused in one of the main usability factors: the efficiency in terms of the time on tasks. Our findings suggest that longer signatures are more negatively influenced in performance by stress situations than shorter signatures, but this performance decrease is still acceptable for recognition.
其中一个最有前途的生物识别模式建议,以确保移动设备是动态签名验证。用户普遍认为签名是一种常见的行为。在签署文件时,人们往往会感到压力或不适,但这是否会对签名识别产生负面影响?在这项工作中,几个用户参与了在压力条件下用手写笔在普通智能手机上签名的可用性评估。这是针对这种生物识别系统在用户可能遭受一定程度压力的情况下的潜在用途,例如在法庭,银行甚至购物。我们关注的是一个主要的可用性因素:处理任务的时间效率。我们的研究结果表明,在压力情况下,较长的签名比较短的签名对表现的负面影响更大,但这种表现下降仍然是可以接受的。
{"title":"On the effect of time efficiency in DSV under stress","authors":"Ramón Blanco-Gonzalo, R. Sánchez-Reillo, N. Poh","doi":"10.1109/CCST.2014.6987035","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987035","url":null,"abstract":"One of the most promising biometric modalities suggested to secure mobile devices is dynamic signature verification. It is widely accepted by users as to sign is considered a usual action. At the time to sign documents, it happens that people tend to feel stress or discomfort, but does it influence negatively to the signature recognition? In this work several users participated in a usability evaluation signing in a common smartphone with a stylus under stress conditions. This is targeting the potential use of this kind of biometric systems in scenarios where the user may suffer a certain level of stress, such as in courts, banks or even shopping. We have focused in one of the main usability factors: the efficiency in terms of the time on tasks. Our findings suggest that longer signatures are more negatively influenced in performance by stress situations than shorter signatures, but this performance decrease is still acceptable for recognition.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"453 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116180787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An anti-intrusion protection barrier based on 2D radar technology 一种基于二维雷达技术的防入侵防护屏障
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6987015
S. Salvador, R. Maggiora, D. Milanesio, G. Rodighiero
The 2D (range and azimuth) radar system here presented has been developed for civilian and industrial anti-intrusion applications and has been designed to provide an impassable protection barrier with controllable width (down to one meter). It is based on a CW double chirp technique: a linearly changing frequency signal is transmitted and the signals reflected by possible intruders (targets) are properly processed to determine, by analyzing their frequency content, the position in azimuth and range of the target itself. The system is mainly composed of a 24 GHz transceiver module for the transmission and reception of the signals, a real-time processing DSP-based board and an interface board for communication with the user and with external devices. The transceiver module includes one transmitting (TX) and two receiving (RX) antennas and an MMIC chip for the generation of the radar signals and the reception of echoes and their coherent pulse compression and filtering. The TX and RX antennas are patch 2D arrays with a designed beam-width of approximately 6° and side-lobe suppression achieved through appropriate elements power tapering. The main element of the transceiver is an MMIC chip which converts the triangular continuous wave generated by the DSP board into a varying frequency (24-24.250 GHz) wave for feeding the TX antenna. The high frequency received echo signals are then pulse compressed by the MMIC, filtered and sent back to the DSP board. The processing board is equipped with a DAC, four ADCs, a 300 MHz DSP and many peripherals. The received echo signals, converted into frequency domain through complex FFT, are processed with sophisticated algorithms for background removal (MTI filter), thresholding (CFAR algorithms, RCS analysis and more) and range determination. The determination of the azimuthal position of the target is based on a phase comparison mono-pulse technique. The analysis allows to determine both the range and the azimuth position and to accurately achieve the desired 2D shape of the detection area (usually a very narrow BLADE shape). The sophisticated processing algorithm makes the system resilient to atmospheric events such as wind, snow and rain, and capable of discriminating between human targets and small animals. The interface board gives the user the possibility to properly configure the radar system by setting all the parameters through an appropriate GUI and regulate the radar sensitivity all over the protection area. Furthermore, it allows the system to be integrated in a network of sensors, video cameras and other devices.
这里介绍的2D(距离和方位)雷达系统是为民用和工业反入侵应用而开发的,旨在提供一个不可逾越的保护屏障,宽度可控制(低至一米)。它基于连续波双啁啾技术:发射线性变化的频率信号,对可能的入侵者(目标)反射的信号进行适当处理,通过分析其频率含量来确定目标本身在方位角和距离中的位置。该系统主要由用于信号收发的24ghz收发模块、基于dsp的实时处理板和用于与用户及外部设备通信的接口板组成。收发模块包括一个发射(TX)和两个接收(RX)天线和一个MMIC芯片,用于雷达信号的产生和回波的接收及其相干脉冲的压缩和滤波。TX和RX天线是贴片2D阵列,设计波束宽度约为6°,通过适当的元件功率逐渐减小来实现旁瓣抑制。收发器的主要元件是MMIC芯片,该芯片将DSP板产生的三角连续波转换为可变频率(24-24.250 GHz)波,用于馈送TX天线。接收到的高频回波信号经MMIC脉冲压缩、滤波后发回DSP板。该处理板配备了一个DAC、四个adc、一个300 MHz DSP和许多外设。接收到的回波信号,通过复杂FFT转换到频域,用复杂的算法进行背景去除(MTI滤波器)、阈值处理(CFAR算法、RCS分析等)和距离确定。目标方位位置的确定是基于一种相位比较单脉冲技术。分析允许确定距离和方位角位置,并准确地实现所需的二维形状的检测区域(通常是一个非常窄的刀片形状)。复杂的处理算法使该系统能够适应风、雪、雨等大气事件,并能够区分人类目标和小动物。接口板使用户可以通过适当的GUI设置所有参数来正确配置雷达系统,并调节整个保护区域的雷达灵敏度。此外,它还允许系统集成到传感器、摄像机和其他设备的网络中。
{"title":"An anti-intrusion protection barrier based on 2D radar technology","authors":"S. Salvador, R. Maggiora, D. Milanesio, G. Rodighiero","doi":"10.1109/CCST.2014.6987015","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987015","url":null,"abstract":"The 2D (range and azimuth) radar system here presented has been developed for civilian and industrial anti-intrusion applications and has been designed to provide an impassable protection barrier with controllable width (down to one meter). It is based on a CW double chirp technique: a linearly changing frequency signal is transmitted and the signals reflected by possible intruders (targets) are properly processed to determine, by analyzing their frequency content, the position in azimuth and range of the target itself. The system is mainly composed of a 24 GHz transceiver module for the transmission and reception of the signals, a real-time processing DSP-based board and an interface board for communication with the user and with external devices. The transceiver module includes one transmitting (TX) and two receiving (RX) antennas and an MMIC chip for the generation of the radar signals and the reception of echoes and their coherent pulse compression and filtering. The TX and RX antennas are patch 2D arrays with a designed beam-width of approximately 6° and side-lobe suppression achieved through appropriate elements power tapering. The main element of the transceiver is an MMIC chip which converts the triangular continuous wave generated by the DSP board into a varying frequency (24-24.250 GHz) wave for feeding the TX antenna. The high frequency received echo signals are then pulse compressed by the MMIC, filtered and sent back to the DSP board. The processing board is equipped with a DAC, four ADCs, a 300 MHz DSP and many peripherals. The received echo signals, converted into frequency domain through complex FFT, are processed with sophisticated algorithms for background removal (MTI filter), thresholding (CFAR algorithms, RCS analysis and more) and range determination. The determination of the azimuthal position of the target is based on a phase comparison mono-pulse technique. The analysis allows to determine both the range and the azimuth position and to accurately achieve the desired 2D shape of the detection area (usually a very narrow BLADE shape). The sophisticated processing algorithm makes the system resilient to atmospheric events such as wind, snow and rain, and capable of discriminating between human targets and small animals. The interface board gives the user the possibility to properly configure the radar system by setting all the parameters through an appropriate GUI and regulate the radar sensitivity all over the protection area. Furthermore, it allows the system to be integrated in a network of sensors, video cameras and other devices.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"260 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132034479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dependencies analysis in emergency scenarios 紧急情况下的依赖项分析
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6987022
R. Setola, D. Lorusso, M. Maggio
Recently, the “All Hazard” paradigm gained a large interest in the framework of Critical Infrastructure Protection, stressing the importance to guarantee an adequate level of service continuity in spite of any type of negative events, ranging from natural disasters to technological faults, considering both accidental and malicious actions. However, such an approach makes more difficult the analysis of the scenario, because experts have to consider a multitude of possible causes and their possible effects. Moreover, there is the need to consider, further to the direct consequences, also those induced by second or higher-level effects, i.e. the consequences induced by dependencies on other systems and cascading effects on the population. To help experts in this hard task, within the EC co-funded project Threvi2, the authors developed an approach to manage the cause-effect relationships using a taxonomic framework, where the different causes are decomposed in their elementary effects, and then grouped into classes of threats.
最近,“所有危险”范式在关键基础设施保护框架中获得了很大的兴趣,强调了在任何类型的负面事件(从自然灾害到技术故障)的情况下,考虑到意外和恶意行为,确保足够水平的服务连续性的重要性。然而,这种方法使得对情景的分析变得更加困难,因为专家们必须考虑大量可能的原因及其可能的影响。此外,除了直接后果之外,还需要考虑由第二级或更高一级的影响所引起的后果,即对其他系统的依赖和对人口的级联效应所引起的后果。为了帮助专家完成这项艰巨的任务,在欧共体共同资助的Threvi2项目中,作者开发了一种使用分类框架来管理因果关系的方法,在该框架中,不同的原因被分解为它们的基本影响,然后被分组为威胁的类别。
{"title":"Dependencies analysis in emergency scenarios","authors":"R. Setola, D. Lorusso, M. Maggio","doi":"10.1109/CCST.2014.6987022","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987022","url":null,"abstract":"Recently, the “All Hazard” paradigm gained a large interest in the framework of Critical Infrastructure Protection, stressing the importance to guarantee an adequate level of service continuity in spite of any type of negative events, ranging from natural disasters to technological faults, considering both accidental and malicious actions. However, such an approach makes more difficult the analysis of the scenario, because experts have to consider a multitude of possible causes and their possible effects. Moreover, there is the need to consider, further to the direct consequences, also those induced by second or higher-level effects, i.e. the consequences induced by dependencies on other systems and cascading effects on the population. To help experts in this hard task, within the EC co-funded project Threvi2, the authors developed an approach to manage the cause-effect relationships using a taxonomic framework, where the different causes are decomposed in their elementary effects, and then grouped into classes of threats.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134014003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Centralized security governance for air navigation services: Innovative strategies to confront emerging threats against Civil Aviation 空中导航服务的集中安全治理:应对民用航空新出现的威胁的创新战略
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6986968
F. Maio
Civil aviation remains an attracting target for criminals and the obligation to protect civil aviation against acts of unlawful interference must cope with increasingly sophisticated threats, many of a technological nature. The development of complex systems, by their nature interoperable, in an increasingly global and supranational environment, requires a methodological approach of the security governance to enable the constant monitoring of resources, process integration between IT, logical and physical security, continuously measuring the threat level and the potential vulnerability, with the aim to react and respond to acts of unlawful interference. This requires also a close and continuous link between all the actors of the system. The legal framework, both European and national, forms a solid term of reference, but the mere compliance with regulations is not enough, while it is always necessary to demonstrate due diligence for the protection of human lives in the air and on the ground and to ensure, in general, security, continuity, resilience and regularity of the public service of transportation by air. ENAV, Italian State-owned Air Navigation Service Provider, is in charge a vital segment of aviation and it has established an integrated security management system, focused on the concept of centralized government. Its centerpiece is the Security Operation Center, now evolving into an Integrated Defense Center, in constant evolution and aimed at a full context awareness and adaptive response. In accordance with Annex 17 to the Chicago Convention and related guidance material, ENAV provided a strategy based on the principle to combine technology, human and material resources, a set of processes and procedures intended to address a continuous improvement based on Deming cycle. Furthermore, the process management is focused on internationally recognized standards and committed to the exchange of information with the appropriate authorities and key stakeholders to achieve the dynamic configuration of the devices of physical and logical security and their responsiveness in the context of the system of critical infrastructure protection and cyber security system of the Italian Republic.
民用航空仍然是吸引犯罪分子的目标,保护民用航空不受非法干扰的义务必须应对日益复杂的威胁,其中许多是技术性的威胁。在日益全球化和超国家的环境中,复杂系统的发展,由于其本质上是可互操作的,需要一种安全治理的方法学方法,以实现对资源的持续监控,IT、逻辑和物理安全之间的过程集成,持续测量威胁级别和潜在漏洞,目的是对非法干扰行为作出反应和响应。这也需要在系统的所有参与者之间建立密切和持续的联系。欧洲和各国的法律框架构成了坚实的职权范围,但仅仅遵守条例是不够的,同时始终有必要表现出应有的努力,以保护空中和地面上的人的生命,并在一般情况下确保公共航空运输服务的安全、连续性、弹性和规律性。ENAV是意大利国有空中导航服务提供商,负责航空的一个重要部分,它建立了一个综合安全管理系统,专注于中央政府的概念。它的核心是安全操作中心,现在正在演变成一个综合防御中心,不断发展,旨在实现全面的上下文感知和自适应响应。根据《芝加哥公约》附件17和相关指导材料,ENAV提供了基于技术、人力和物质资源相结合的原则的战略,一套旨在解决基于戴明循环的持续改进的过程和程序。此外,流程管理侧重于国际公认的标准,并致力于与有关当局和主要利益相关者交换信息,以实现物理和逻辑安全设备的动态配置及其在意大利共和国关键基础设施保护系统和网络安全系统背景下的响应能力。
{"title":"Centralized security governance for air navigation services: Innovative strategies to confront emerging threats against Civil Aviation","authors":"F. Maio","doi":"10.1109/CCST.2014.6986968","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986968","url":null,"abstract":"Civil aviation remains an attracting target for criminals and the obligation to protect civil aviation against acts of unlawful interference must cope with increasingly sophisticated threats, many of a technological nature. The development of complex systems, by their nature interoperable, in an increasingly global and supranational environment, requires a methodological approach of the security governance to enable the constant monitoring of resources, process integration between IT, logical and physical security, continuously measuring the threat level and the potential vulnerability, with the aim to react and respond to acts of unlawful interference. This requires also a close and continuous link between all the actors of the system. The legal framework, both European and national, forms a solid term of reference, but the mere compliance with regulations is not enough, while it is always necessary to demonstrate due diligence for the protection of human lives in the air and on the ground and to ensure, in general, security, continuity, resilience and regularity of the public service of transportation by air. ENAV, Italian State-owned Air Navigation Service Provider, is in charge a vital segment of aviation and it has established an integrated security management system, focused on the concept of centralized government. Its centerpiece is the Security Operation Center, now evolving into an Integrated Defense Center, in constant evolution and aimed at a full context awareness and adaptive response. In accordance with Annex 17 to the Chicago Convention and related guidance material, ENAV provided a strategy based on the principle to combine technology, human and material resources, a set of processes and procedures intended to address a continuous improvement based on Deming cycle. Furthermore, the process management is focused on internationally recognized standards and committed to the exchange of information with the appropriate authorities and key stakeholders to achieve the dynamic configuration of the devices of physical and logical security and their responsiveness in the context of the system of critical infrastructure protection and cyber security system of the Italian Republic.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134097075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Temporal analysis of intrusion detection 入侵检测的时间分析
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6987012
Mofreh A. Hogo
Intrusion detection system (IDS) is becoming an integral part of the network security infrastructure. Data mining tools are widely used for developing IDS. There is a lack of researches in the temporal data mining analysis of the intrusions (intrusions detection over different time periods). Most of researches are focusing on the latest snapshot data mining of intrusion detection systems. This work presented in this paper proposes a new temporal data mining analysis technique of intrusion detection systems based on naïve Bayes networks. The presented system considered the time dimension and built many different classifier models to obtain an accurate analysis of intruders. The obtained results give more focusing and deep understanding of the intruders' behavior during the different time periods and illustrate the shrinking and expansions of intruders' classes over the time slices (the migrations of intruders from one segment to another), The temporal analysis of intruders can help in taking an appropriate decision against specific type of attacks (decisions must be suitable with the intruder behaviour). The results indicate the reduction of the possible high positive false rate.
入侵检测系统(IDS)正在成为网络安全基础设施的重要组成部分。数据挖掘工具被广泛用于开发IDS。在入侵的时态数据挖掘分析(即不同时间段的入侵检测)方面缺乏研究。大多数研究都集中在入侵检测系统的最新快照数据挖掘上。本文提出了一种新的基于naïve贝叶斯网络的入侵检测系统时序数据挖掘分析技术。该系统考虑了时间维度,并建立了许多不同的分类器模型,以获得对入侵者的准确分析。所获得的结果提供了对不同时间段内入侵者行为的更多关注和深入理解,并说明了入侵者类别在时间片上的缩小和扩展(入侵者从一个段迁移到另一个段)。入侵者的时间分析可以帮助对特定类型的攻击采取适当的决策(决策必须与入侵者的行为相适应)。结果表明,该方法降低了可能出现的高误报率。
{"title":"Temporal analysis of intrusion detection","authors":"Mofreh A. Hogo","doi":"10.1109/CCST.2014.6987012","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987012","url":null,"abstract":"Intrusion detection system (IDS) is becoming an integral part of the network security infrastructure. Data mining tools are widely used for developing IDS. There is a lack of researches in the temporal data mining analysis of the intrusions (intrusions detection over different time periods). Most of researches are focusing on the latest snapshot data mining of intrusion detection systems. This work presented in this paper proposes a new temporal data mining analysis technique of intrusion detection systems based on naïve Bayes networks. The presented system considered the time dimension and built many different classifier models to obtain an accurate analysis of intruders. The obtained results give more focusing and deep understanding of the intruders' behavior during the different time periods and illustrate the shrinking and expansions of intruders' classes over the time slices (the migrations of intruders from one segment to another), The temporal analysis of intruders can help in taking an appropriate decision against specific type of attacks (decisions must be suitable with the intruder behaviour). The results indicate the reduction of the possible high positive false rate.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131605353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Secure faults detection for preventing fire risk in PV systems 安全故障检测,防止光伏系统的火灾风险
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6987023
Simona Capparella, M. Falvo
Photovoltaic (PV) systems has been playing a key role during the last years in the evolution of electricity sector. Concerning the design issues for guaranteeing security and safety, it is particularly important to take into account that a PV plant is a "special" system of generation, in which the presence of a d.c. generator results in changings of the technical rules used for the design of electrical systems. Choices regarding the layout of the system, the grounding of the negative pole of the d.c. side and the means of protection are fundamental for the design of a PV system that takes into account the risk of fire. The subject of this article is the analysis of the relation between electrical phenomena that can occur inside of a PV system and the related means of protection (depending on the system's architecture) that can guarantee the secure fault detection and so prevent the occurrence and development of a fire.
近年来,光伏(PV)系统在电力行业的发展中发挥了关键作用。关于保障安全和安全的设计问题,特别重要的是要考虑到光伏电站是一个“特殊”的发电系统,其中直流发电机的存在导致用于电气系统设计的技术规则发生变化。系统布局的选择、直流侧负极的接地和保护手段是考虑火灾风险的光伏系统设计的基础。本文的主题是分析光伏系统内部可能发生的电气现象与相关保护手段(取决于系统架构)之间的关系,这些保护手段可以保证安全的故障检测,从而防止火灾的发生和发展。
{"title":"Secure faults detection for preventing fire risk in PV systems","authors":"Simona Capparella, M. Falvo","doi":"10.1109/CCST.2014.6987023","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987023","url":null,"abstract":"Photovoltaic (PV) systems has been playing a key role during the last years in the evolution of electricity sector. Concerning the design issues for guaranteeing security and safety, it is particularly important to take into account that a PV plant is a \"special\" system of generation, in which the presence of a d.c. generator results in changings of the technical rules used for the design of electrical systems. Choices regarding the layout of the system, the grounding of the negative pole of the d.c. side and the means of protection are fundamental for the design of a PV system that takes into account the risk of fire. The subject of this article is the analysis of the relation between electrical phenomena that can occur inside of a PV system and the related means of protection (depending on the system's architecture) that can guarantee the secure fault detection and so prevent the occurrence and development of a fire.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127577455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Privacy leakages in Smart Home wireless technologies 智能家居无线技术中的隐私泄露
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6986977
Ignacio Sanchez, R. Satta, I. N. Fovino, G. Baldini, G. Steri, David Shaw, A. Ciardulli
The concept of Smart Home where appliances, sensors, actuators, displays and computing resources are connected and interact to support the life of the citizen is being increasingly researched. In this context, the Wi-Fi communication technology has grown to become the de-facto standard for data communications in Smart Home environments, with cordless telephony being dominated by the DECT protocol. Even though both technologies incorporate sets of security features aimed at securing the confidentiality and integrity of the communications, the nature and the design of both radio-frequency protocols make them vulnerable, up to a certain extent, to privacy leakages through traffic analysis attacks. In this paper we explore the information leakage vulnerabilities inherent to these technologies and their potential impact on citizens' privacy in the context of the Smart Home. We demonstrate how the websites visited by a smart device can be inferred by applying machine learning and pattern matching techniques to eavesdropped encrypted traffic.
智能家居的概念是将家电、传感器、执行器、显示器和计算资源连接起来并相互作用,以支持市民的生活,这一概念正在得到越来越多的研究。在这种背景下,Wi-Fi通信技术已经发展成为智能家居环境中数据通信的事实上的标准,而无绳电话则由DECT协议主导。尽管这两种技术都包含了旨在确保通信的机密性和完整性的安全特性,但这两种无线电频率协议的性质和设计使它们在一定程度上容易受到流量分析攻击造成的隐私泄露。在本文中,我们探讨了这些技术固有的信息泄露漏洞及其在智能家居背景下对公民隐私的潜在影响。我们演示了如何通过将机器学习和模式匹配技术应用于窃听的加密流量来推断智能设备访问的网站。
{"title":"Privacy leakages in Smart Home wireless technologies","authors":"Ignacio Sanchez, R. Satta, I. N. Fovino, G. Baldini, G. Steri, David Shaw, A. Ciardulli","doi":"10.1109/CCST.2014.6986977","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986977","url":null,"abstract":"The concept of Smart Home where appliances, sensors, actuators, displays and computing resources are connected and interact to support the life of the citizen is being increasingly researched. In this context, the Wi-Fi communication technology has grown to become the de-facto standard for data communications in Smart Home environments, with cordless telephony being dominated by the DECT protocol. Even though both technologies incorporate sets of security features aimed at securing the confidentiality and integrity of the communications, the nature and the design of both radio-frequency protocols make them vulnerable, up to a certain extent, to privacy leakages through traffic analysis attacks. In this paper we explore the information leakage vulnerabilities inherent to these technologies and their potential impact on citizens' privacy in the context of the Smart Home. We demonstrate how the websites visited by a smart device can be inferred by applying machine learning and pattern matching techniques to eavesdropped encrypted traffic.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115365107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
期刊
2014 International Carnahan Conference on Security Technology (ICCST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1