首页 > 最新文献

2014 International Carnahan Conference on Security Technology (ICCST)最新文献

英文 中文
Investigating multimedia contents 调查多媒体内容
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6986976
A. D. Rosa, A. Piva, M. Fontani, Massimo Iuliani
With the increasing diffusion in our life of digital audio and visual contents, the investigation on multimedia objects is acquiring more and more interest within the framework of digital investigations, that consider all the aspects including digital data and digital devices. Starting from the international standards and recommendations on the correct procedures to deal with digital evidences and investigations appropriately, and exploiting the Multimedia Forensics technologies, we propose in this paper a possible methodology for correctly investigating audio-visual contents. Going through the steps of the proposed methodology in an illustrative case study, we show the capability of Multimedia Forensics as a tool for understanding the history of multimedia contents presented to the court as potential digital evidence.
随着数字视听内容在我们生活中的日益普及,在数字调查的框架下,对多媒体对象的调查越来越受到人们的关注,它考虑了数字数据和数字设备的各个方面。本文从国际上关于正确处理数字证据和调查程序的标准和建议出发,利用多媒体取证技术,提出了一种正确调查视听内容的可能方法。在一个说明性案例研究中,我们通过所建议的方法的步骤,展示了多媒体取证作为一种工具的能力,用于理解作为潜在数字证据提交给法院的多媒体内容的历史。
{"title":"Investigating multimedia contents","authors":"A. D. Rosa, A. Piva, M. Fontani, Massimo Iuliani","doi":"10.1109/CCST.2014.6986976","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986976","url":null,"abstract":"With the increasing diffusion in our life of digital audio and visual contents, the investigation on multimedia objects is acquiring more and more interest within the framework of digital investigations, that consider all the aspects including digital data and digital devices. Starting from the international standards and recommendations on the correct procedures to deal with digital evidences and investigations appropriately, and exploiting the Multimedia Forensics technologies, we propose in this paper a possible methodology for correctly investigating audio-visual contents. Going through the steps of the proposed methodology in an illustrative case study, we show the capability of Multimedia Forensics as a tool for understanding the history of multimedia contents presented to the court as potential digital evidence.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129085194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Web-based interface for real-time movement monitoring 基于web的实时运动监控界面
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6987049
O. Kainz, F. Jakab
In this paper the model for real-time monitoring of selected premises is presented and implemented as a Web based interactive interface while utilizing open-source hardware. The rudimentary idea is based on the capabilities offered by contemporary Web technology which enables the development of complex and interactive solutions - essential for our purpose is HTML5 and JavaScript technology. Approach we take incorporates three major parts - model design, interface design and monitoring tool development, when combined together they provide interface for monitoring within personal intranet or over the Internet. Primary outputs provide the ability to monitor the movement and count the number of individuals. Solution presented in this paper may be extended to entire monitoring system consisted of multiple nodes.
本文提出了一种对选定场所进行实时监控的模型,并利用开源硬件实现了基于Web的交互界面。其基本思想是基于当代Web技术提供的功能,这些功能使开发复杂的交互式解决方案成为可能——对我们的目的至关重要的是HTML5和JavaScript技术。我们采用的方法包括三个主要部分——模型设计、接口设计和监控工具开发,当它们结合在一起时,它们提供了在个人内部网或Internet上进行监控的接口。主要输出提供了监控移动和计算个体数量的能力。本文提出的解决方案可以推广到由多个节点组成的整个监控系统。
{"title":"Web-based interface for real-time movement monitoring","authors":"O. Kainz, F. Jakab","doi":"10.1109/CCST.2014.6987049","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987049","url":null,"abstract":"In this paper the model for real-time monitoring of selected premises is presented and implemented as a Web based interactive interface while utilizing open-source hardware. The rudimentary idea is based on the capabilities offered by contemporary Web technology which enables the development of complex and interactive solutions - essential for our purpose is HTML5 and JavaScript technology. Approach we take incorporates three major parts - model design, interface design and monitoring tool development, when combined together they provide interface for monitoring within personal intranet or over the Internet. Primary outputs provide the ability to monitor the movement and count the number of individuals. Solution presented in this paper may be extended to entire monitoring system consisted of multiple nodes.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131838562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Instruction set extensions of AES algorithms for 32-bit processors 32位处理器的AES算法的指令集扩展
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6986988
Noura Ben Hadjy Youssef, W. H. Youssef, Mohsen Machhout, R. Tourki, K. Torki
Embedded processors are an integral part of many communications devices such as mobile phones, secure access to private networks, electronic commerce and smart cards. However, such devices often provide critical functions that could be sabotaged by malicious entities. The supply of security for data exchange on basis of embedded systems is a very important objection to accomplish. This paper focuses on instruction set extensions of symmetric key algorithm. The main contribution of this work is the extension of SPARC V8 LEON2 processor core with cryptographic Instruction Set Extensions. The proposed cryptographic algorithm is Advanced Encryption Standard (AES). Our customized instructions offer a cryptographic solution for embedded devices, in order to ensure communications security. Furthermore, as embedded systems are extremely resource constrained devices in terms of computing capabilities, power and memory area; these technological challenges are respected. Our extended LEON2 SPARC V8 core with cryptographic ISE is implemented using Xilinx XC5VFX70t FPGA device and an ASIC CMOS 40 nm technology. The total area of the resulting Chip is about 0.28 mm2 and can achieve an operating frequency of 3.33 GHz. The estimated power consumption of the chip was 13.3 mW at 10 MHz. Hardware cost and power consumption evaluation are provided for different clock frequencies, the achieved results show that our circuit is able to be arranged in many security domains such as embedded services routers, real-time multimedia applications and smartcard.
嵌入式处理器是许多通信设备的组成部分,如移动电话、安全访问专用网络、电子商务和智能卡。然而,此类设备通常提供可能被恶意实体破坏的关键功能。为基于嵌入式系统的数据交换提供安全保障是一个非常重要的问题。本文主要研究对称密钥算法的指令集扩展。这项工作的主要贡献是扩展了SPARC V8 LEON2处理器核心的加密指令集扩展。提出的加密算法是高级加密标准AES (Advanced Encryption Standard)。我们的定制指令为嵌入式设备提供加密解决方案,以确保通信安全。此外,由于嵌入式系统在计算能力、功率和内存面积方面是极其资源受限的设备;这些技术挑战是值得尊重的。我们的扩展LEON2 SPARC V8核心与加密ISE是使用Xilinx XC5VFX70t FPGA器件和ASIC CMOS 40纳米技术实现的。所得芯片的总面积约为0.28 mm2,可实现3.33 GHz的工作频率。该芯片在10 MHz时的估计功耗为13.3 mW。对不同时钟频率下的硬件成本和功耗进行了评估,结果表明我们的电路可以应用于嵌入式业务路由器、实时多媒体应用和智能卡等安全领域。
{"title":"Instruction set extensions of AES algorithms for 32-bit processors","authors":"Noura Ben Hadjy Youssef, W. H. Youssef, Mohsen Machhout, R. Tourki, K. Torki","doi":"10.1109/CCST.2014.6986988","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986988","url":null,"abstract":"Embedded processors are an integral part of many communications devices such as mobile phones, secure access to private networks, electronic commerce and smart cards. However, such devices often provide critical functions that could be sabotaged by malicious entities. The supply of security for data exchange on basis of embedded systems is a very important objection to accomplish. This paper focuses on instruction set extensions of symmetric key algorithm. The main contribution of this work is the extension of SPARC V8 LEON2 processor core with cryptographic Instruction Set Extensions. The proposed cryptographic algorithm is Advanced Encryption Standard (AES). Our customized instructions offer a cryptographic solution for embedded devices, in order to ensure communications security. Furthermore, as embedded systems are extremely resource constrained devices in terms of computing capabilities, power and memory area; these technological challenges are respected. Our extended LEON2 SPARC V8 core with cryptographic ISE is implemented using Xilinx XC5VFX70t FPGA device and an ASIC CMOS 40 nm technology. The total area of the resulting Chip is about 0.28 mm2 and can achieve an operating frequency of 3.33 GHz. The estimated power consumption of the chip was 13.3 mW at 10 MHz. Hardware cost and power consumption evaluation are provided for different clock frequencies, the achieved results show that our circuit is able to be arranged in many security domains such as embedded services routers, real-time multimedia applications and smartcard.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115372876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A probabilistic framework for improved password strength metrics 改进密码强度度量的概率框架
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6986985
Javier Galbally, Iwen Coisel, Ignacio Sanchez
Passwords are still the most widely deployed form of authentication for both local applications and on-line services. For several decades, password policies have aimed at measuring password strength using simple sets of rules in an attempt to guide the users towards the selection of stronger passwords. In this paper, we provide an alternative vision to the existing password strength metrics by proposing a new statistical approach that is better aligned with the actual resistance of passwords to guessing attacks. The proposed probabilistic framework is able to objectively measure the strength of a given password taking advantage of the information available in the several public datasets of passwords.
密码仍然是本地应用程序和在线服务最广泛使用的身份验证形式。几十年来,密码策略的目的是使用一组简单的规则来测量密码的强度,试图引导用户选择更强的密码。在本文中,我们通过提出一种新的统计方法,更好地与密码对猜测攻击的实际抵抗力保持一致,为现有密码强度指标提供了另一种视角。所提出的概率框架能够利用多个公开密码数据集中的可用信息客观地度量给定密码的强度。
{"title":"A probabilistic framework for improved password strength metrics","authors":"Javier Galbally, Iwen Coisel, Ignacio Sanchez","doi":"10.1109/CCST.2014.6986985","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986985","url":null,"abstract":"Passwords are still the most widely deployed form of authentication for both local applications and on-line services. For several decades, password policies have aimed at measuring password strength using simple sets of rules in an attempt to guide the users towards the selection of stronger passwords. In this paper, we provide an alternative vision to the existing password strength metrics by proposing a new statistical approach that is better aligned with the actual resistance of passwords to guessing attacks. The proposed probabilistic framework is able to objectively measure the strength of a given password taking advantage of the information available in the several public datasets of passwords.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127491073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Surrogate techniques for testing fraud detection algorithms in credit card operations 用于测试信用卡操作中欺诈检测算法的替代技术
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6986987
A. Salazar, G. Safont, L. Vergara
Banks collect large amount of historical records corresponding to millions of credit cards operations, but, unfortunately, only a small portion, if any, is open access. This is because, e.g., the records include confidential customer data and banks are afraid of public quantitative evidence of existing fraud operations. This paper tackles this problem with the application of surrogate techniques to generate new synthetic credit card data. The quality of the surrogate multivariate data is guaranteed by constraining them to have the same covariance, marginal distributions, and joint distributions as the original multivariate data. The performance of fraud detection algorithms (in terms of receiver operating characteristic (ROC) curves) using a varying proportion of real and surrogate data is tested. We demonstrate the feasibility of surrogates in a real scenario considering very low false alarm and high disproportion between legitimate and fraud operations.
银行收集了大量与数百万信用卡操作相对应的历史记录,但不幸的是,如果有的话,只有一小部分是开放的。这是因为,例如,记录包括机密的客户数据,银行害怕公开现有欺诈操作的量化证据。本文通过应用代理技术生成新的合成信用卡数据来解决这个问题。通过约束代理多变量数据具有与原始多变量数据相同的协方差、边际分布和联合分布,保证了代理多变量数据的质量。使用不同比例的真实和替代数据测试欺诈检测算法的性能(根据接收者工作特征(ROC)曲线)。我们在一个真实的场景中证明了代理的可行性,考虑到非常低的假警报和合法和欺诈操作之间的高不比例。
{"title":"Surrogate techniques for testing fraud detection algorithms in credit card operations","authors":"A. Salazar, G. Safont, L. Vergara","doi":"10.1109/CCST.2014.6986987","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986987","url":null,"abstract":"Banks collect large amount of historical records corresponding to millions of credit cards operations, but, unfortunately, only a small portion, if any, is open access. This is because, e.g., the records include confidential customer data and banks are afraid of public quantitative evidence of existing fraud operations. This paper tackles this problem with the application of surrogate techniques to generate new synthetic credit card data. The quality of the surrogate multivariate data is guaranteed by constraining them to have the same covariance, marginal distributions, and joint distributions as the original multivariate data. The performance of fraud detection algorithms (in terms of receiver operating characteristic (ROC) curves) using a varying proportion of real and surrogate data is tested. We demonstrate the feasibility of surrogates in a real scenario considering very low false alarm and high disproportion between legitimate and fraud operations.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121549711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Enhancing security in public transportation services of Roma: The PANDORA system 加强罗姆人公共交通服务的安全:潘多拉系统
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6986969
Pierluigi Pelargonio, M. Pugliese
Nowadays local public transportation services (TPL) in large cities have to be considered critical infrastructures as, for instance, power plants or dams. Especially in Rome, where quite a million citizens per day uses TPL, any interruption in the public services can cause severe deterioration in urban life quality, congestion, compromised mobility and accessibility and enhanced pollution. Moreover TPL, and particularly subways, has been (remember the tragic facts in London subway on July 7th 2005) and still can be a target for terrorist threats and attacks. Therefore security must be considered as a crucial component in TPL services offer. Nevertheless lessons learnt from our experience, have suggested to apply some enhancements to the “classical” security model to switch the security operator from a mostly passive to a quite pro-active role and from a reaction to occurred events to preemptive actions. In other words, the role of security operators has to move from simple passive control (e.g. “see” events) in real-time, transferring data to stakeholders and ensuring timely decision-making without unnecessary steps in the communication chain. This paper will show how the advanced security services provided by our “PANDORA” system can enable this paradigm evolution. The “PANDORA” system is funded by the Italian Infrastructure and Transportation Ministry within the program framework of TPL security enhancement in the largest Italian cities.
如今,大城市的当地公共交通服务(TPL)必须被视为关键的基础设施,例如发电厂或水坝。特别是在罗马,每天有近百万市民使用TPL,公共服务的任何中断都可能导致城市生活质量严重恶化、拥堵、机动性和可达性受损以及污染加剧。此外,TPL,特别是地铁,一直是(记住2005年7月7日伦敦地铁的悲惨事实),并且仍然可能成为恐怖主义威胁和袭击的目标。因此,安全性必须被视为TPL服务提供中的一个重要组成部分。然而,从我们的经验中吸取的教训建议对“经典”安全模型进行一些改进,以将安全操作员从被动的角色转变为积极主动的角色,并从对发生事件的反应转变为先发制人的行动。换句话说,安全操作员的角色必须从简单的实时被动控制(例如“看到”事件)转变为将数据传递给利益相关者并确保及时决策,而无需在通信链中采取不必要的步骤。本文将展示我们的“潘多拉”系统提供的高级安全服务如何使这种范式进化成为可能。“PANDORA”系统由意大利基础设施和运输部在意大利最大城市的TPL安全增强计划框架内资助。
{"title":"Enhancing security in public transportation services of Roma: The PANDORA system","authors":"Pierluigi Pelargonio, M. Pugliese","doi":"10.1109/CCST.2014.6986969","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986969","url":null,"abstract":"Nowadays local public transportation services (TPL) in large cities have to be considered critical infrastructures as, for instance, power plants or dams. Especially in Rome, where quite a million citizens per day uses TPL, any interruption in the public services can cause severe deterioration in urban life quality, congestion, compromised mobility and accessibility and enhanced pollution. Moreover TPL, and particularly subways, has been (remember the tragic facts in London subway on July 7th 2005) and still can be a target for terrorist threats and attacks. Therefore security must be considered as a crucial component in TPL services offer. Nevertheless lessons learnt from our experience, have suggested to apply some enhancements to the “classical” security model to switch the security operator from a mostly passive to a quite pro-active role and from a reaction to occurred events to preemptive actions. In other words, the role of security operators has to move from simple passive control (e.g. “see” events) in real-time, transferring data to stakeholders and ensuring timely decision-making without unnecessary steps in the communication chain. This paper will show how the advanced security services provided by our “PANDORA” system can enable this paradigm evolution. The “PANDORA” system is funded by the Italian Infrastructure and Transportation Ministry within the program framework of TPL security enhancement in the largest Italian cities.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129486113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Skype traffic detection: A decision theory based tool Skype流量检测:基于决策理论的工具
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6986975
M. Mauro, M. Longo
The classification of data sessions on the Internet is a crucial issue for Authorities involved in lawful interception. Some Internet Service Providers (ISP) can provide a panel of IP nodes that, tuned to detect specific data patterns, are able to send an alert when a data session in a targeted class is found. Unluckily, several applications generate a bulk of IP traffic not characterized by a recognizable sequence of information segments, except, may be, for some short phases such as setup and release. Whenever such phases are not intercepted, no specific pattern in the IP traffic can help toward semantic recognition and hence statistical pattern recognition is in force. This is actually the case of Skype, the popular application for VoIP communications. In this paper we propose and evaluate a decision theory based system allowing to recognize Skype traffic with the help of an open-source machine learning tool: Weka.
对互联网上的数据会话进行分类是涉及合法拦截的当局的一个关键问题。一些Internet服务提供商(ISP)可以提供一组IP节点,这些节点经过调优以检测特定的数据模式,能够在发现目标类中的数据会话时发送警报。不幸的是,有几个应用程序生成的大量IP流量不具有可识别的信息段序列的特征,除了一些较短的阶段,例如设置和释放。只要这些阶段没有被拦截,IP流量中没有特定的模式可以帮助进行语义识别,因此统计模式识别是有效的。这实际上是Skype的情况,它是VoIP通信的流行应用程序。在本文中,我们提出并评估了一个基于决策理论的系统,该系统允许在开源机器学习工具Weka的帮助下识别Skype流量。
{"title":"Skype traffic detection: A decision theory based tool","authors":"M. Mauro, M. Longo","doi":"10.1109/CCST.2014.6986975","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986975","url":null,"abstract":"The classification of data sessions on the Internet is a crucial issue for Authorities involved in lawful interception. Some Internet Service Providers (ISP) can provide a panel of IP nodes that, tuned to detect specific data patterns, are able to send an alert when a data session in a targeted class is found. Unluckily, several applications generate a bulk of IP traffic not characterized by a recognizable sequence of information segments, except, may be, for some short phases such as setup and release. Whenever such phases are not intercepted, no specific pattern in the IP traffic can help toward semantic recognition and hence statistical pattern recognition is in force. This is actually the case of Skype, the popular application for VoIP communications. In this paper we propose and evaluate a decision theory based system allowing to recognize Skype traffic with the help of an open-source machine learning tool: Weka.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134062720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Best practices for the security evaluation of biometric systems 生物识别系统安全评估的最佳实践
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6987034
B. Fernandez-Saavedra, R. Sánchez-Reillo, J. Liu-Jimenez, J. G. Ruiz
This paper describes best practices for the security evaluation of biometric systems. This type of evaluation has been addressed in several documents. However, not all of these documents describe the complete evaluation methodology, or are focused on biometrics or do propose clear testing procedures. Therefore, this work defines the most proper way to carry out this evaluation methodology considering biometrics and the special characteristics of these kind of systems (i.e. biometrics is non-deterministic technology highly influenced by user behavior and the operational environment). In particular, this paper specifies how to select which attacks shall be studied, how to conduct such attacks and which is the most suitable method to report the evaluation results.
本文描述了生物识别系统安全评估的最佳实践。这类评价在几个文件中都有涉及。然而,并非所有这些文件都描述了完整的评估方法,或专注于生物识别或提出明确的测试程序。因此,考虑到生物识别技术和这类系统的特殊特性(即生物识别技术是受用户行为和操作环境高度影响的非确定性技术),本工作定义了执行这种评估方法的最合适方法。特别是,本文规定了如何选择研究哪些攻击,如何进行攻击,以及哪种方法最适合报告评估结果。
{"title":"Best practices for the security evaluation of biometric systems","authors":"B. Fernandez-Saavedra, R. Sánchez-Reillo, J. Liu-Jimenez, J. G. Ruiz","doi":"10.1109/CCST.2014.6987034","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987034","url":null,"abstract":"This paper describes best practices for the security evaluation of biometric systems. This type of evaluation has been addressed in several documents. However, not all of these documents describe the complete evaluation methodology, or are focused on biometrics or do propose clear testing procedures. Therefore, this work defines the most proper way to carry out this evaluation methodology considering biometrics and the special characteristics of these kind of systems (i.e. biometrics is non-deterministic technology highly influenced by user behavior and the operational environment). In particular, this paper specifies how to select which attacks shall be studied, how to conduct such attacks and which is the most suitable method to report the evaluation results.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134210785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A framework for Internet data real-time processing: A machine-learning approach 互联网数据实时处理的框架:一种机器学习方法
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6987044
M. Mauro, Cesario Di Sarno
Nowadays, the Internet Service Providers have to keep track of and in some cases to analyze for legal issues, a great amount of Internet data. Real-time big data processing and analysis introduce new challenges that must be addressed by system engineers. This is because: 1) traditional technologies exploiting databases are not designed to process a huge amount of data in real-time 2) classic machine learning algorithms implemented by widely adopted tools as Weka or R are not designed to perform “on the fly” analysis on streamed data. In this paper the authors propose an architecture that makes the real-time big data processing and analysis possible. The proposed architecture is based on two main components: a stream processing engine called Apache Storm and a framework called Yahoo SAMOA allowing to perform data analysis through distributed streaming machine learning algorithms. Our architecture is tested for Skype traffic recognition within network traffic generated by several Personal Computers in a streamed way. Experimental results have shown the effectiveness of proposed solution.
如今,互联网服务提供商必须跟踪并在某些情况下分析法律问题,大量的互联网数据。实时大数据处理和分析带来了系统工程师必须解决的新挑战。这是因为:1)利用数据库的传统技术并不是为了实时处理大量数据而设计的;2)由Weka或R等广泛采用的工具实现的经典机器学习算法并不是为了对流数据执行“动态”分析而设计的。本文提出了一种使实时大数据处理和分析成为可能的体系结构。提议的架构基于两个主要组件:一个名为Apache Storm的流处理引擎和一个名为Yahoo SAMOA的框架,该框架允许通过分布式流机器学习算法执行数据分析。我们的架构测试了Skype流量识别的网络流量由几个个人电脑以流的方式产生。实验结果表明了该方法的有效性。
{"title":"A framework for Internet data real-time processing: A machine-learning approach","authors":"M. Mauro, Cesario Di Sarno","doi":"10.1109/CCST.2014.6987044","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987044","url":null,"abstract":"Nowadays, the Internet Service Providers have to keep track of and in some cases to analyze for legal issues, a great amount of Internet data. Real-time big data processing and analysis introduce new challenges that must be addressed by system engineers. This is because: 1) traditional technologies exploiting databases are not designed to process a huge amount of data in real-time 2) classic machine learning algorithms implemented by widely adopted tools as Weka or R are not designed to perform “on the fly” analysis on streamed data. In this paper the authors propose an architecture that makes the real-time big data processing and analysis possible. The proposed architecture is based on two main components: a stream processing engine called Apache Storm and a framework called Yahoo SAMOA allowing to perform data analysis through distributed streaming machine learning algorithms. Our architecture is tested for Skype traffic recognition within network traffic generated by several Personal Computers in a streamed way. Experimental results have shown the effectiveness of proposed solution.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128897446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
RHU Keystroke: A mobile-based benchmark for keystroke dynamics systems RHU击键:一个基于移动设备的击键动力学系统基准
Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6986984
Mohamad El-Abed, Mostafa Dafer, Ramzi El Khayat
The performance evaluation of biometric systems is being highly considered in order to increase the widespread use of this technology in our daily life. Nowadays, there are few public benchmarks available to researchers towards this goal. In order to contribute in solving this problem, we present in this paper a keystroke dynamics benchmark collected using a touch screen phone. An analysis of the collected features is also covered in this paper.
为了使生物识别技术在我们的日常生活中得到更广泛的应用,生物识别系统的性能评估正受到人们的高度重视。如今,很少有公共基准可供研究人员用于实现这一目标。为了有助于解决这一问题,本文提出了一个使用触摸屏手机收集的按键动力学基准。本文还对收集到的特征进行了分析。
{"title":"RHU Keystroke: A mobile-based benchmark for keystroke dynamics systems","authors":"Mohamad El-Abed, Mostafa Dafer, Ramzi El Khayat","doi":"10.1109/CCST.2014.6986984","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986984","url":null,"abstract":"The performance evaluation of biometric systems is being highly considered in order to increase the widespread use of this technology in our daily life. Nowadays, there are few public benchmarks available to researchers towards this goal. In order to contribute in solving this problem, we present in this paper a keystroke dynamics benchmark collected using a touch screen phone. An analysis of the collected features is also covered in this paper.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121298803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
期刊
2014 International Carnahan Conference on Security Technology (ICCST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1