首页 > 最新文献

2014 International Carnahan Conference on Security Technology (ICCST)最新文献

英文 中文
GPU: Application for CCTV systems GPU: CCTV系统的应用
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6987028
V. Saiz, Fernan Gallego
Current generation GPU's are really powerful, with lots of stream processors, fast memory and in some cases hardware video decoding support. Their prices are low and support multiple high resolution outputs. Its main use is in CAD applications and Video-games due they geometry processing capabilities, but they are really good at image processing. That makes them ideal for CCTV rendering. Traditional CCTV systems are based on a stack of decoder cards with analog outputs. These systems are expensive and hard to install due to its physical connections. We can replace such a system with a PC with a good GPU card. This system presents some advantages over the analog solution: it can use an existing network installation, can show any source that the PC can receive (HTML, VNC, Capturers, etc), can mix analog and IP cameras and the GPU shader capabilities permits apply complex filters to the video. Moreover, we can use the GPU video analysis (motion detection, face recognition, etc). In this paper we present a system aid to decode and render multiple video sources, based on a PC platform (but feasible in any platform with a modern GPU, we have it running on a Raspberry Pi) capable of decoding and rendering close to 100 video streams on a current system, with support of 24 monitors in a single machine. This system is already working and installed in multiple places with good results.
当前的GPU非常强大,有很多流处理器,快速内存,在某些情况下还支持硬件视频解码。它们价格低廉,支持多种高分辨率输出。它的主要用途是CAD应用程序和视频游戏,因为它们具有几何处理能力,但它们真正擅长的是图像处理。这使它们成为闭路电视渲染的理想选择。传统的闭路电视系统是基于一堆具有模拟输出的解码卡。由于其物理连接,这些系统价格昂贵且难以安装。我们可以用一台有好的GPU卡的PC机来代替这样的系统。与模拟解决方案相比,该系统具有一些优势:它可以使用现有的网络安装,可以显示PC可以接收的任何源(HTML, VNC, capchers等),可以混合模拟和IP摄像机,GPU着色器功能允许对视频应用复杂的过滤器。此外,我们可以使用GPU进行视频分析(运动检测,人脸识别等)。在本文中,我们提出了一个系统辅助解码和渲染多个视频源,基于PC平台(但在任何具有现代GPU的平台上都是可行的,我们让它在树莓派上运行),能够在当前系统上解码和渲染接近100个视频流,在一台机器上支持24个显示器。该系统已经在多个地方运行并安装,效果良好。
{"title":"GPU: Application for CCTV systems","authors":"V. Saiz, Fernan Gallego","doi":"10.1109/CCST.2014.6987028","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987028","url":null,"abstract":"Current generation GPU's are really powerful, with lots of stream processors, fast memory and in some cases hardware video decoding support. Their prices are low and support multiple high resolution outputs. Its main use is in CAD applications and Video-games due they geometry processing capabilities, but they are really good at image processing. That makes them ideal for CCTV rendering. Traditional CCTV systems are based on a stack of decoder cards with analog outputs. These systems are expensive and hard to install due to its physical connections. We can replace such a system with a PC with a good GPU card. This system presents some advantages over the analog solution: it can use an existing network installation, can show any source that the PC can receive (HTML, VNC, Capturers, etc), can mix analog and IP cameras and the GPU shader capabilities permits apply complex filters to the video. Moreover, we can use the GPU video analysis (motion detection, face recognition, etc). In this paper we present a system aid to decode and render multiple video sources, based on a PC platform (but feasible in any platform with a modern GPU, we have it running on a Raspberry Pi) capable of decoding and rendering close to 100 video streams on a current system, with support of 24 monitors in a single machine. This system is already working and installed in multiple places with good results.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126304414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
EMBERS: EpheMeral biometrically enhanced real-time location System 余烬:短暂的生物识别增强实时定位系统
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6986971
Sung Choi, M. Bierma, Yung Ryn Choe, David Zage
In nuclear facilities, having efficient accountability of critical assets, personnel locations, and activities is essential for productive, safe, and secure operations. Such accountability tracked through standard manual procedures is highly inefficient and prone to human error. The ability to actively and autonomously monitor both personnel and critical assets can significantly enhance security and safety operations while removing significant levels of human reliability issues and reducing insider threat concerns. A Real-Time Location System (RTLS) encompasses several technologies that use wireless signals to determine the precise location of tagged critical assets or personnel. RTLS systems include tags that either transmit or receive signals at regular intervals, location sensors/beacons that receive/transmit signals, and a location appliance that collects and correlates the data. Combined with ephemeral biometrics (EB) to validate the live-state of a user, an ephemeral biometrically-enhanced RTLS (EMBERS) can eliminate time-consuming manual searches and audits by providing precise location data. If critical assets or people leave a defined secured area, EMBERS can automatically trigger an alert and function as an access control mechanism and/or ingress/egress monitoring tool. Three different EMBERS application scenarios for safety and security have been analyzed and the heuristic results of this study are outlined in this paper along with areas of technological improvements and innovations that can be made if EMBERS is to be used as safety and security tool.
在核设施中,对关键资产、人员位置和活动进行有效的问责,对于生产、安全、可靠的运营至关重要。这种通过标准手动程序跟踪的责任是非常低效的,并且容易出现人为错误。主动和自主监控人员和关键资产的能力可以显著提高安全性和安全操作,同时消除严重的人为可靠性问题,减少内部威胁。实时定位系统(RTLS)包含多种技术,使用无线信号来确定标记的关键资产或人员的精确位置。RTLS系统包括定期发送或接收信号的标签,接收/发送信号的位置传感器/信标,以及收集和关联数据的位置设备。结合临时生物识别技术(EB)来验证用户的实时状态,临时生物识别增强的RTLS (EMBERS)可以通过提供精确的位置数据来消除耗时的手动搜索和审计。如果关键资产或人员离开指定的安全区域,EMBERS可以自动触发警报,并作为访问控制机制和/或进出监控工具。本文分析了三种不同的EMBERS在安全和安保方面的应用场景,并概述了本研究的启发式结果,以及如果将EMBERS用作安全和安保工具,可以进行的技术改进和创新领域。
{"title":"EMBERS: EpheMeral biometrically enhanced real-time location System","authors":"Sung Choi, M. Bierma, Yung Ryn Choe, David Zage","doi":"10.1109/CCST.2014.6986971","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986971","url":null,"abstract":"In nuclear facilities, having efficient accountability of critical assets, personnel locations, and activities is essential for productive, safe, and secure operations. Such accountability tracked through standard manual procedures is highly inefficient and prone to human error. The ability to actively and autonomously monitor both personnel and critical assets can significantly enhance security and safety operations while removing significant levels of human reliability issues and reducing insider threat concerns. A Real-Time Location System (RTLS) encompasses several technologies that use wireless signals to determine the precise location of tagged critical assets or personnel. RTLS systems include tags that either transmit or receive signals at regular intervals, location sensors/beacons that receive/transmit signals, and a location appliance that collects and correlates the data. Combined with ephemeral biometrics (EB) to validate the live-state of a user, an ephemeral biometrically-enhanced RTLS (EMBERS) can eliminate time-consuming manual searches and audits by providing precise location data. If critical assets or people leave a defined secured area, EMBERS can automatically trigger an alert and function as an access control mechanism and/or ingress/egress monitoring tool. Three different EMBERS application scenarios for safety and security have been analyzed and the heuristic results of this study are outlined in this paper along with areas of technological improvements and innovations that can be made if EMBERS is to be used as safety and security tool.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126340804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Instruction set extensions of AES algorithms for 32-bit processors 32位处理器的AES算法的指令集扩展
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6986988
Noura Ben Hadjy Youssef, W. H. Youssef, Mohsen Machhout, R. Tourki, K. Torki
Embedded processors are an integral part of many communications devices such as mobile phones, secure access to private networks, electronic commerce and smart cards. However, such devices often provide critical functions that could be sabotaged by malicious entities. The supply of security for data exchange on basis of embedded systems is a very important objection to accomplish. This paper focuses on instruction set extensions of symmetric key algorithm. The main contribution of this work is the extension of SPARC V8 LEON2 processor core with cryptographic Instruction Set Extensions. The proposed cryptographic algorithm is Advanced Encryption Standard (AES). Our customized instructions offer a cryptographic solution for embedded devices, in order to ensure communications security. Furthermore, as embedded systems are extremely resource constrained devices in terms of computing capabilities, power and memory area; these technological challenges are respected. Our extended LEON2 SPARC V8 core with cryptographic ISE is implemented using Xilinx XC5VFX70t FPGA device and an ASIC CMOS 40 nm technology. The total area of the resulting Chip is about 0.28 mm2 and can achieve an operating frequency of 3.33 GHz. The estimated power consumption of the chip was 13.3 mW at 10 MHz. Hardware cost and power consumption evaluation are provided for different clock frequencies, the achieved results show that our circuit is able to be arranged in many security domains such as embedded services routers, real-time multimedia applications and smartcard.
嵌入式处理器是许多通信设备的组成部分,如移动电话、安全访问专用网络、电子商务和智能卡。然而,此类设备通常提供可能被恶意实体破坏的关键功能。为基于嵌入式系统的数据交换提供安全保障是一个非常重要的问题。本文主要研究对称密钥算法的指令集扩展。这项工作的主要贡献是扩展了SPARC V8 LEON2处理器核心的加密指令集扩展。提出的加密算法是高级加密标准AES (Advanced Encryption Standard)。我们的定制指令为嵌入式设备提供加密解决方案,以确保通信安全。此外,由于嵌入式系统在计算能力、功率和内存面积方面是极其资源受限的设备;这些技术挑战是值得尊重的。我们的扩展LEON2 SPARC V8核心与加密ISE是使用Xilinx XC5VFX70t FPGA器件和ASIC CMOS 40纳米技术实现的。所得芯片的总面积约为0.28 mm2,可实现3.33 GHz的工作频率。该芯片在10 MHz时的估计功耗为13.3 mW。对不同时钟频率下的硬件成本和功耗进行了评估,结果表明我们的电路可以应用于嵌入式业务路由器、实时多媒体应用和智能卡等安全领域。
{"title":"Instruction set extensions of AES algorithms for 32-bit processors","authors":"Noura Ben Hadjy Youssef, W. H. Youssef, Mohsen Machhout, R. Tourki, K. Torki","doi":"10.1109/CCST.2014.6986988","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986988","url":null,"abstract":"Embedded processors are an integral part of many communications devices such as mobile phones, secure access to private networks, electronic commerce and smart cards. However, such devices often provide critical functions that could be sabotaged by malicious entities. The supply of security for data exchange on basis of embedded systems is a very important objection to accomplish. This paper focuses on instruction set extensions of symmetric key algorithm. The main contribution of this work is the extension of SPARC V8 LEON2 processor core with cryptographic Instruction Set Extensions. The proposed cryptographic algorithm is Advanced Encryption Standard (AES). Our customized instructions offer a cryptographic solution for embedded devices, in order to ensure communications security. Furthermore, as embedded systems are extremely resource constrained devices in terms of computing capabilities, power and memory area; these technological challenges are respected. Our extended LEON2 SPARC V8 core with cryptographic ISE is implemented using Xilinx XC5VFX70t FPGA device and an ASIC CMOS 40 nm technology. The total area of the resulting Chip is about 0.28 mm2 and can achieve an operating frequency of 3.33 GHz. The estimated power consumption of the chip was 13.3 mW at 10 MHz. Hardware cost and power consumption evaluation are provided for different clock frequencies, the achieved results show that our circuit is able to be arranged in many security domains such as embedded services routers, real-time multimedia applications and smartcard.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115372876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A probabilistic framework for improved password strength metrics 改进密码强度度量的概率框架
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6986985
Javier Galbally, Iwen Coisel, Ignacio Sanchez
Passwords are still the most widely deployed form of authentication for both local applications and on-line services. For several decades, password policies have aimed at measuring password strength using simple sets of rules in an attempt to guide the users towards the selection of stronger passwords. In this paper, we provide an alternative vision to the existing password strength metrics by proposing a new statistical approach that is better aligned with the actual resistance of passwords to guessing attacks. The proposed probabilistic framework is able to objectively measure the strength of a given password taking advantage of the information available in the several public datasets of passwords.
密码仍然是本地应用程序和在线服务最广泛使用的身份验证形式。几十年来,密码策略的目的是使用一组简单的规则来测量密码的强度,试图引导用户选择更强的密码。在本文中,我们通过提出一种新的统计方法,更好地与密码对猜测攻击的实际抵抗力保持一致,为现有密码强度指标提供了另一种视角。所提出的概率框架能够利用多个公开密码数据集中的可用信息客观地度量给定密码的强度。
{"title":"A probabilistic framework for improved password strength metrics","authors":"Javier Galbally, Iwen Coisel, Ignacio Sanchez","doi":"10.1109/CCST.2014.6986985","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986985","url":null,"abstract":"Passwords are still the most widely deployed form of authentication for both local applications and on-line services. For several decades, password policies have aimed at measuring password strength using simple sets of rules in an attempt to guide the users towards the selection of stronger passwords. In this paper, we provide an alternative vision to the existing password strength metrics by proposing a new statistical approach that is better aligned with the actual resistance of passwords to guessing attacks. The proposed probabilistic framework is able to objectively measure the strength of a given password taking advantage of the information available in the several public datasets of passwords.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127491073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Surrogate techniques for testing fraud detection algorithms in credit card operations 用于测试信用卡操作中欺诈检测算法的替代技术
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6986987
A. Salazar, G. Safont, L. Vergara
Banks collect large amount of historical records corresponding to millions of credit cards operations, but, unfortunately, only a small portion, if any, is open access. This is because, e.g., the records include confidential customer data and banks are afraid of public quantitative evidence of existing fraud operations. This paper tackles this problem with the application of surrogate techniques to generate new synthetic credit card data. The quality of the surrogate multivariate data is guaranteed by constraining them to have the same covariance, marginal distributions, and joint distributions as the original multivariate data. The performance of fraud detection algorithms (in terms of receiver operating characteristic (ROC) curves) using a varying proportion of real and surrogate data is tested. We demonstrate the feasibility of surrogates in a real scenario considering very low false alarm and high disproportion between legitimate and fraud operations.
银行收集了大量与数百万信用卡操作相对应的历史记录,但不幸的是,如果有的话,只有一小部分是开放的。这是因为,例如,记录包括机密的客户数据,银行害怕公开现有欺诈操作的量化证据。本文通过应用代理技术生成新的合成信用卡数据来解决这个问题。通过约束代理多变量数据具有与原始多变量数据相同的协方差、边际分布和联合分布,保证了代理多变量数据的质量。使用不同比例的真实和替代数据测试欺诈检测算法的性能(根据接收者工作特征(ROC)曲线)。我们在一个真实的场景中证明了代理的可行性,考虑到非常低的假警报和合法和欺诈操作之间的高不比例。
{"title":"Surrogate techniques for testing fraud detection algorithms in credit card operations","authors":"A. Salazar, G. Safont, L. Vergara","doi":"10.1109/CCST.2014.6986987","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986987","url":null,"abstract":"Banks collect large amount of historical records corresponding to millions of credit cards operations, but, unfortunately, only a small portion, if any, is open access. This is because, e.g., the records include confidential customer data and banks are afraid of public quantitative evidence of existing fraud operations. This paper tackles this problem with the application of surrogate techniques to generate new synthetic credit card data. The quality of the surrogate multivariate data is guaranteed by constraining them to have the same covariance, marginal distributions, and joint distributions as the original multivariate data. The performance of fraud detection algorithms (in terms of receiver operating characteristic (ROC) curves) using a varying proportion of real and surrogate data is tested. We demonstrate the feasibility of surrogates in a real scenario considering very low false alarm and high disproportion between legitimate and fraud operations.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121549711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Enhancing security in public transportation services of Roma: The PANDORA system 加强罗姆人公共交通服务的安全:潘多拉系统
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6986969
Pierluigi Pelargonio, M. Pugliese
Nowadays local public transportation services (TPL) in large cities have to be considered critical infrastructures as, for instance, power plants or dams. Especially in Rome, where quite a million citizens per day uses TPL, any interruption in the public services can cause severe deterioration in urban life quality, congestion, compromised mobility and accessibility and enhanced pollution. Moreover TPL, and particularly subways, has been (remember the tragic facts in London subway on July 7th 2005) and still can be a target for terrorist threats and attacks. Therefore security must be considered as a crucial component in TPL services offer. Nevertheless lessons learnt from our experience, have suggested to apply some enhancements to the “classical” security model to switch the security operator from a mostly passive to a quite pro-active role and from a reaction to occurred events to preemptive actions. In other words, the role of security operators has to move from simple passive control (e.g. “see” events) in real-time, transferring data to stakeholders and ensuring timely decision-making without unnecessary steps in the communication chain. This paper will show how the advanced security services provided by our “PANDORA” system can enable this paradigm evolution. The “PANDORA” system is funded by the Italian Infrastructure and Transportation Ministry within the program framework of TPL security enhancement in the largest Italian cities.
如今,大城市的当地公共交通服务(TPL)必须被视为关键的基础设施,例如发电厂或水坝。特别是在罗马,每天有近百万市民使用TPL,公共服务的任何中断都可能导致城市生活质量严重恶化、拥堵、机动性和可达性受损以及污染加剧。此外,TPL,特别是地铁,一直是(记住2005年7月7日伦敦地铁的悲惨事实),并且仍然可能成为恐怖主义威胁和袭击的目标。因此,安全性必须被视为TPL服务提供中的一个重要组成部分。然而,从我们的经验中吸取的教训建议对“经典”安全模型进行一些改进,以将安全操作员从被动的角色转变为积极主动的角色,并从对发生事件的反应转变为先发制人的行动。换句话说,安全操作员的角色必须从简单的实时被动控制(例如“看到”事件)转变为将数据传递给利益相关者并确保及时决策,而无需在通信链中采取不必要的步骤。本文将展示我们的“潘多拉”系统提供的高级安全服务如何使这种范式进化成为可能。“PANDORA”系统由意大利基础设施和运输部在意大利最大城市的TPL安全增强计划框架内资助。
{"title":"Enhancing security in public transportation services of Roma: The PANDORA system","authors":"Pierluigi Pelargonio, M. Pugliese","doi":"10.1109/CCST.2014.6986969","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986969","url":null,"abstract":"Nowadays local public transportation services (TPL) in large cities have to be considered critical infrastructures as, for instance, power plants or dams. Especially in Rome, where quite a million citizens per day uses TPL, any interruption in the public services can cause severe deterioration in urban life quality, congestion, compromised mobility and accessibility and enhanced pollution. Moreover TPL, and particularly subways, has been (remember the tragic facts in London subway on July 7th 2005) and still can be a target for terrorist threats and attacks. Therefore security must be considered as a crucial component in TPL services offer. Nevertheless lessons learnt from our experience, have suggested to apply some enhancements to the “classical” security model to switch the security operator from a mostly passive to a quite pro-active role and from a reaction to occurred events to preemptive actions. In other words, the role of security operators has to move from simple passive control (e.g. “see” events) in real-time, transferring data to stakeholders and ensuring timely decision-making without unnecessary steps in the communication chain. This paper will show how the advanced security services provided by our “PANDORA” system can enable this paradigm evolution. The “PANDORA” system is funded by the Italian Infrastructure and Transportation Ministry within the program framework of TPL security enhancement in the largest Italian cities.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129486113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Skype traffic detection: A decision theory based tool Skype流量检测:基于决策理论的工具
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6986975
M. Mauro, M. Longo
The classification of data sessions on the Internet is a crucial issue for Authorities involved in lawful interception. Some Internet Service Providers (ISP) can provide a panel of IP nodes that, tuned to detect specific data patterns, are able to send an alert when a data session in a targeted class is found. Unluckily, several applications generate a bulk of IP traffic not characterized by a recognizable sequence of information segments, except, may be, for some short phases such as setup and release. Whenever such phases are not intercepted, no specific pattern in the IP traffic can help toward semantic recognition and hence statistical pattern recognition is in force. This is actually the case of Skype, the popular application for VoIP communications. In this paper we propose and evaluate a decision theory based system allowing to recognize Skype traffic with the help of an open-source machine learning tool: Weka.
对互联网上的数据会话进行分类是涉及合法拦截的当局的一个关键问题。一些Internet服务提供商(ISP)可以提供一组IP节点,这些节点经过调优以检测特定的数据模式,能够在发现目标类中的数据会话时发送警报。不幸的是,有几个应用程序生成的大量IP流量不具有可识别的信息段序列的特征,除了一些较短的阶段,例如设置和释放。只要这些阶段没有被拦截,IP流量中没有特定的模式可以帮助进行语义识别,因此统计模式识别是有效的。这实际上是Skype的情况,它是VoIP通信的流行应用程序。在本文中,我们提出并评估了一个基于决策理论的系统,该系统允许在开源机器学习工具Weka的帮助下识别Skype流量。
{"title":"Skype traffic detection: A decision theory based tool","authors":"M. Mauro, M. Longo","doi":"10.1109/CCST.2014.6986975","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986975","url":null,"abstract":"The classification of data sessions on the Internet is a crucial issue for Authorities involved in lawful interception. Some Internet Service Providers (ISP) can provide a panel of IP nodes that, tuned to detect specific data patterns, are able to send an alert when a data session in a targeted class is found. Unluckily, several applications generate a bulk of IP traffic not characterized by a recognizable sequence of information segments, except, may be, for some short phases such as setup and release. Whenever such phases are not intercepted, no specific pattern in the IP traffic can help toward semantic recognition and hence statistical pattern recognition is in force. This is actually the case of Skype, the popular application for VoIP communications. In this paper we propose and evaluate a decision theory based system allowing to recognize Skype traffic with the help of an open-source machine learning tool: Weka.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134062720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Best practices for the security evaluation of biometric systems 生物识别系统安全评估的最佳实践
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6987034
B. Fernandez-Saavedra, R. Sánchez-Reillo, J. Liu-Jimenez, J. G. Ruiz
This paper describes best practices for the security evaluation of biometric systems. This type of evaluation has been addressed in several documents. However, not all of these documents describe the complete evaluation methodology, or are focused on biometrics or do propose clear testing procedures. Therefore, this work defines the most proper way to carry out this evaluation methodology considering biometrics and the special characteristics of these kind of systems (i.e. biometrics is non-deterministic technology highly influenced by user behavior and the operational environment). In particular, this paper specifies how to select which attacks shall be studied, how to conduct such attacks and which is the most suitable method to report the evaluation results.
本文描述了生物识别系统安全评估的最佳实践。这类评价在几个文件中都有涉及。然而,并非所有这些文件都描述了完整的评估方法,或专注于生物识别或提出明确的测试程序。因此,考虑到生物识别技术和这类系统的特殊特性(即生物识别技术是受用户行为和操作环境高度影响的非确定性技术),本工作定义了执行这种评估方法的最合适方法。特别是,本文规定了如何选择研究哪些攻击,如何进行攻击,以及哪种方法最适合报告评估结果。
{"title":"Best practices for the security evaluation of biometric systems","authors":"B. Fernandez-Saavedra, R. Sánchez-Reillo, J. Liu-Jimenez, J. G. Ruiz","doi":"10.1109/CCST.2014.6987034","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987034","url":null,"abstract":"This paper describes best practices for the security evaluation of biometric systems. This type of evaluation has been addressed in several documents. However, not all of these documents describe the complete evaluation methodology, or are focused on biometrics or do propose clear testing procedures. Therefore, this work defines the most proper way to carry out this evaluation methodology considering biometrics and the special characteristics of these kind of systems (i.e. biometrics is non-deterministic technology highly influenced by user behavior and the operational environment). In particular, this paper specifies how to select which attacks shall be studied, how to conduct such attacks and which is the most suitable method to report the evaluation results.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134210785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A framework for Internet data real-time processing: A machine-learning approach 互联网数据实时处理的框架:一种机器学习方法
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6987044
M. Mauro, Cesario Di Sarno
Nowadays, the Internet Service Providers have to keep track of and in some cases to analyze for legal issues, a great amount of Internet data. Real-time big data processing and analysis introduce new challenges that must be addressed by system engineers. This is because: 1) traditional technologies exploiting databases are not designed to process a huge amount of data in real-time 2) classic machine learning algorithms implemented by widely adopted tools as Weka or R are not designed to perform “on the fly” analysis on streamed data. In this paper the authors propose an architecture that makes the real-time big data processing and analysis possible. The proposed architecture is based on two main components: a stream processing engine called Apache Storm and a framework called Yahoo SAMOA allowing to perform data analysis through distributed streaming machine learning algorithms. Our architecture is tested for Skype traffic recognition within network traffic generated by several Personal Computers in a streamed way. Experimental results have shown the effectiveness of proposed solution.
如今,互联网服务提供商必须跟踪并在某些情况下分析法律问题,大量的互联网数据。实时大数据处理和分析带来了系统工程师必须解决的新挑战。这是因为:1)利用数据库的传统技术并不是为了实时处理大量数据而设计的;2)由Weka或R等广泛采用的工具实现的经典机器学习算法并不是为了对流数据执行“动态”分析而设计的。本文提出了一种使实时大数据处理和分析成为可能的体系结构。提议的架构基于两个主要组件:一个名为Apache Storm的流处理引擎和一个名为Yahoo SAMOA的框架,该框架允许通过分布式流机器学习算法执行数据分析。我们的架构测试了Skype流量识别的网络流量由几个个人电脑以流的方式产生。实验结果表明了该方法的有效性。
{"title":"A framework for Internet data real-time processing: A machine-learning approach","authors":"M. Mauro, Cesario Di Sarno","doi":"10.1109/CCST.2014.6987044","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987044","url":null,"abstract":"Nowadays, the Internet Service Providers have to keep track of and in some cases to analyze for legal issues, a great amount of Internet data. Real-time big data processing and analysis introduce new challenges that must be addressed by system engineers. This is because: 1) traditional technologies exploiting databases are not designed to process a huge amount of data in real-time 2) classic machine learning algorithms implemented by widely adopted tools as Weka or R are not designed to perform “on the fly” analysis on streamed data. In this paper the authors propose an architecture that makes the real-time big data processing and analysis possible. The proposed architecture is based on two main components: a stream processing engine called Apache Storm and a framework called Yahoo SAMOA allowing to perform data analysis through distributed streaming machine learning algorithms. Our architecture is tested for Skype traffic recognition within network traffic generated by several Personal Computers in a streamed way. Experimental results have shown the effectiveness of proposed solution.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128897446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
RHU Keystroke: A mobile-based benchmark for keystroke dynamics systems RHU击键:一个基于移动设备的击键动力学系统基准
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6986984
Mohamad El-Abed, Mostafa Dafer, Ramzi El Khayat
The performance evaluation of biometric systems is being highly considered in order to increase the widespread use of this technology in our daily life. Nowadays, there are few public benchmarks available to researchers towards this goal. In order to contribute in solving this problem, we present in this paper a keystroke dynamics benchmark collected using a touch screen phone. An analysis of the collected features is also covered in this paper.
为了使生物识别技术在我们的日常生活中得到更广泛的应用,生物识别系统的性能评估正受到人们的高度重视。如今,很少有公共基准可供研究人员用于实现这一目标。为了有助于解决这一问题,本文提出了一个使用触摸屏手机收集的按键动力学基准。本文还对收集到的特征进行了分析。
{"title":"RHU Keystroke: A mobile-based benchmark for keystroke dynamics systems","authors":"Mohamad El-Abed, Mostafa Dafer, Ramzi El Khayat","doi":"10.1109/CCST.2014.6986984","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986984","url":null,"abstract":"The performance evaluation of biometric systems is being highly considered in order to increase the widespread use of this technology in our daily life. Nowadays, there are few public benchmarks available to researchers towards this goal. In order to contribute in solving this problem, we present in this paper a keystroke dynamics benchmark collected using a touch screen phone. An analysis of the collected features is also covered in this paper.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121298803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
期刊
2014 International Carnahan Conference on Security Technology (ICCST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1