首页 > 最新文献

2022 IEEE Conference on Dependable and Secure Computing (DSC)最新文献

英文 中文
Defending OC-SVM based IDS from poisoning attacks 保护基于OC-SVM的IDS免受投毒攻击
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888908
Lu Zhang, R. Cushing, P. Grosso
Machine learning techniques are widely used to detect intrusions in the cyber security field. However, most machine learning models are vulnerable to poisoning attacks, in which malicious samples are injected into the training dataset to manipulate the classifier's performance. In this paper, we first evaluate the accuracy degradation of OC-SVM classifiers with 3 different poisoning strategies with the ADLA-FD public dataset and a real world dataset. Secondly, we propose a saniti-zation mechanism based on the DBSCAN clustering algorithm. In addition, we investigate the influences of different distance metrics and different dimensionality reduction techniques and evaluate the sensitivity of the DBSCAN parameters. The ex-perimental results show that the poisoning attacks can degrade the performance of the OC-SVM classifier to a large degree, with an accuracy equal to 0.5 in most settings. The proposed sanitization method can filter out poisoned samples effectively for both datasets. The accuracy after sanitization is very close or even higher to the original value.
机器学习技术被广泛应用于网络安全领域的入侵检测。然而,大多数机器学习模型容易受到中毒攻击,其中恶意样本被注入训练数据集中以操纵分类器的性能。在本文中,我们首先使用ADLA-FD公共数据集和真实世界数据集评估了3种不同中毒策略下OC-SVM分类器的精度退化。其次,我们提出了一种基于DBSCAN聚类算法的净化机制。此外,我们还研究了不同距离度量和不同降维技术的影响,并评估了DBSCAN参数的灵敏度。实验结果表明,中毒攻击在很大程度上降低了OC-SVM分类器的性能,在大多数情况下准确率为0.5。所提出的消毒方法可以有效地过滤出两个数据集的有毒样本。消毒后的精度与原值非常接近甚至更高。
{"title":"Defending OC-SVM based IDS from poisoning attacks","authors":"Lu Zhang, R. Cushing, P. Grosso","doi":"10.1109/DSC54232.2022.9888908","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888908","url":null,"abstract":"Machine learning techniques are widely used to detect intrusions in the cyber security field. However, most machine learning models are vulnerable to poisoning attacks, in which malicious samples are injected into the training dataset to manipulate the classifier's performance. In this paper, we first evaluate the accuracy degradation of OC-SVM classifiers with 3 different poisoning strategies with the ADLA-FD public dataset and a real world dataset. Secondly, we propose a saniti-zation mechanism based on the DBSCAN clustering algorithm. In addition, we investigate the influences of different distance metrics and different dimensionality reduction techniques and evaluate the sensitivity of the DBSCAN parameters. The ex-perimental results show that the poisoning attacks can degrade the performance of the OC-SVM classifier to a large degree, with an accuracy equal to 0.5 in most settings. The proposed sanitization method can filter out poisoned samples effectively for both datasets. The accuracy after sanitization is very close or even higher to the original value.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124784186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Call for a New Privacy & Security Regime for IoT Smart Toys 呼吁物联网智能玩具建立新的隐私和安全制度
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888910
Joshua Streiff, Naheem Noah, Sanchari Das
The current set of reactive regulatory agencies, legal protections, and market forces have proven inadequate for managing the security and privacy of the Internet of Things (IoT). Given the ubiquitous nature of IoT devices, current cybersecurity and privacy laws fail to enforce the protections of the data of vulnerable populations. The most vulnerable of these users are children, who are at the most significant risk of harm and least adequately protected by the current regime of controls for devices such as smart toys. In this paper, we review the currently existing regulatory and legal controls related to IoT devices while giving a brief overview of privacy & security policies that govern the data access, retention, and usage policies of children's smart toys. We detail the impact of such security and privacy vulnerabilities by conducting three case studies on IoT smart toys, including FisherPrice's SmartBear, Spiral Toys CloudPet Unicorn, and Owl's SmartWatch. Finally, we establish reasons for the complete restructuring of the responsibilities, requirements, and proactive options for implementing cybersecurity rules by IoT device manufacturers.
事实证明,目前被动的监管机构、法律保护和市场力量不足以管理物联网(IoT)的安全和隐私。鉴于物联网设备无处不在的性质,目前的网络安全和隐私法律未能强制保护弱势群体的数据。这些用户中最脆弱的是儿童,他们受到伤害的风险最大,而目前对智能玩具等设备的管制制度对他们的保护最不充分。在本文中,我们回顾了目前与物联网设备相关的监管和法律控制,同时简要概述了管理儿童智能玩具的数据访问、保留和使用政策的隐私和安全政策。我们通过对物联网智能玩具(包括FisherPrice的SmartBear、Spiral toys的CloudPet Unicorn和Owl的SmartWatch)进行三个案例研究,详细介绍了此类安全和隐私漏洞的影响。最后,我们建立了对物联网设备制造商实施网络安全规则的责任、要求和主动选项进行全面重组的原因。
{"title":"A Call for a New Privacy & Security Regime for IoT Smart Toys","authors":"Joshua Streiff, Naheem Noah, Sanchari Das","doi":"10.1109/DSC54232.2022.9888910","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888910","url":null,"abstract":"The current set of reactive regulatory agencies, legal protections, and market forces have proven inadequate for managing the security and privacy of the Internet of Things (IoT). Given the ubiquitous nature of IoT devices, current cybersecurity and privacy laws fail to enforce the protections of the data of vulnerable populations. The most vulnerable of these users are children, who are at the most significant risk of harm and least adequately protected by the current regime of controls for devices such as smart toys. In this paper, we review the currently existing regulatory and legal controls related to IoT devices while giving a brief overview of privacy & security policies that govern the data access, retention, and usage policies of children's smart toys. We detail the impact of such security and privacy vulnerabilities by conducting three case studies on IoT smart toys, including FisherPrice's SmartBear, Spiral Toys CloudPet Unicorn, and Owl's SmartWatch. Finally, we establish reasons for the complete restructuring of the responsibilities, requirements, and proactive options for implementing cybersecurity rules by IoT device manufacturers.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127054605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ELSA: Edge Lightweight Searchable Attribute-based encryption Multi-keyword Scalability ELSA: Edge轻量级可搜索属性加密多关键字可扩展性
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888846
Jawhara Aljabri, A. L. Michala, Jeremy Singer
The digitalisation of industrial manufacturing needs the support of systems technology to enhance the efficiency of manufacturing operations, product quality, and smart decisions. This digitalisation can be achieved by the industrial internet of things (IIoT). IIoT has played a powerful role in smart manufacturing by performing real-time analysis for a large volume of data. One possible approach to perform these operations in a secure and privacy-preserving manner is to utilise cryptographic solutions. In previous work, we proposed searchable encryption with an access control algorithm for IIoT based on an edge-cloud architecture, namely ELSA. This paper extends ELSA to illustrate the correlation between the number of keywords and ELSA performance. This extension supports annotating records with multiple keywords in trapdoor and record storage and allows the record to be returnable with single-keyword queries. In addition, the experiments demonstrate the scalability and efficiency of ELSA with an increasing number of keywords and complexity.
工业制造的数字化需要系统技术的支持,以提高制造运营效率、产品质量和智能决策。这种数字化可以通过工业物联网(IIoT)实现。工业物联网通过对大量数据进行实时分析,在智能制造中发挥了强大的作用。以安全和保护隐私的方式执行这些操作的一种可能方法是利用加密解决方案。在之前的工作中,我们提出了基于边缘云架构的IIoT访问控制算法的可搜索加密,即ELSA。本文扩展了ELSA,以说明关键字数量与ELSA性能之间的相关性。这个扩展支持在trapdoor和记录存储中标注多个关键字的记录,并允许记录与单关键字查询可返回。此外,实验表明,随着关键词数量和复杂度的增加,ELSA的可扩展性和效率也在不断提高。
{"title":"ELSA: Edge Lightweight Searchable Attribute-based encryption Multi-keyword Scalability","authors":"Jawhara Aljabri, A. L. Michala, Jeremy Singer","doi":"10.1109/DSC54232.2022.9888846","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888846","url":null,"abstract":"The digitalisation of industrial manufacturing needs the support of systems technology to enhance the efficiency of manufacturing operations, product quality, and smart decisions. This digitalisation can be achieved by the industrial internet of things (IIoT). IIoT has played a powerful role in smart manufacturing by performing real-time analysis for a large volume of data. One possible approach to perform these operations in a secure and privacy-preserving manner is to utilise cryptographic solutions. In previous work, we proposed searchable encryption with an access control algorithm for IIoT based on an edge-cloud architecture, namely ELSA. This paper extends ELSA to illustrate the correlation between the number of keywords and ELSA performance. This extension supports annotating records with multiple keywords in trapdoor and record storage and allows the record to be returnable with single-keyword queries. In addition, the experiments demonstrate the scalability and efficiency of ELSA with an increasing number of keywords and complexity.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128192969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Analysis of Novel Bit-flip Attacks and Defense Strategies for DNNs 新型dnn位翻转攻击与防御策略的设计与分析
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888943
Yash Khare, Kumud Lakara, M. S. Inukonda, Sparsh Mittal, Mahesh Chandra, Arvind Kaushik
In this paper, we present novel bit-flip attack (BFA) algorithms for DNNs, along with techniques for defending against the attack. Our attack algorithms leverage information about the layer importance, such that a layer is considered important if it has high-ranked feature maps. We first present a classwise-targeted attack that degrades the accuracy of just one class in the dataset. Comparative evaluation with related works shows the effectiveness of our attack algorithm. We finally propose multiple novel defense strategies against untargeted BFAs. We comprehensively evaluate the robustness of both large-scale CNNs (VGG19, ResNext50, AlexNet and Res Net) and compact CNNs (MobileNet-v2, ShuffleNet, GoogleNet and SqueezeNet) towards BFAs. We also reveal a valuable insight that compact CNNs are highly vulnerable to not only well-crafted BFAs such as ours, but even random BFAs. Also, defense strategies are less effective on compact CNNs. This fact makes them unsuitable for use in security-critical domains. Source code is released at https://sites.google.com/view/dsc-2022-paper-bit-flip-attack.
在本文中,我们提出了新的dnn比特翻转攻击(BFA)算法,以及防御攻击的技术。我们的攻击算法利用有关层重要性的信息,例如,如果一个层具有高排名的特征映射,则认为它重要。我们首先提出了一种针对类别的攻击,它只会降低数据集中一个类别的准确性。通过与相关文献的对比分析,证明了该算法的有效性。我们最后提出了针对非靶向BFAs的多种新型防御策略。我们全面评估了大规模cnn (VGG19、ResNext50、AlexNet和Res Net)和紧凑型cnn (MobileNet-v2、ShuffleNet、GoogleNet和SqueezeNet)对BFAs的鲁棒性。我们还揭示了一个有价值的见解,即紧凑型cnn不仅极易受到精心设计的bfa(如我们的bfa)的攻击,甚至是随机bfa的攻击。此外,防御策略对紧凑型cnn的效果较差。这一事实使得它们不适合用于安全关键领域。源代码发布在https://sites.google.com/view/dsc-2022-paper-bit-flip-attack。
{"title":"Design and Analysis of Novel Bit-flip Attacks and Defense Strategies for DNNs","authors":"Yash Khare, Kumud Lakara, M. S. Inukonda, Sparsh Mittal, Mahesh Chandra, Arvind Kaushik","doi":"10.1109/DSC54232.2022.9888943","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888943","url":null,"abstract":"In this paper, we present novel bit-flip attack (BFA) algorithms for DNNs, along with techniques for defending against the attack. Our attack algorithms leverage information about the layer importance, such that a layer is considered important if it has high-ranked feature maps. We first present a classwise-targeted attack that degrades the accuracy of just one class in the dataset. Comparative evaluation with related works shows the effectiveness of our attack algorithm. We finally propose multiple novel defense strategies against untargeted BFAs. We comprehensively evaluate the robustness of both large-scale CNNs (VGG19, ResNext50, AlexNet and Res Net) and compact CNNs (MobileNet-v2, ShuffleNet, GoogleNet and SqueezeNet) towards BFAs. We also reveal a valuable insight that compact CNNs are highly vulnerable to not only well-crafted BFAs such as ours, but even random BFAs. Also, defense strategies are less effective on compact CNNs. This fact makes them unsuitable for use in security-critical domains. Source code is released at https://sites.google.com/view/dsc-2022-paper-bit-flip-attack.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134101514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-task Learning Model based on Multiple Characteristics and Multiple Interests for CTR prediction 基于多特征多兴趣的CTR预测多任务学习模型
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888898
Yufeng Xie, Mingchu Li, Kun Lu, Syed Bilal Hussain Shah, Xiao Zheng
In the era of big data, the acquisition and utilization of information becomes difficult with the skyrocketing amount of data. It is often difficult for ordinary users to find the in-formation or items they need, and personalized recommendation systems can solve this problem well. Currently, recommendation systems increasingly adopt models based on deep learning. The most critical issue in using deep learning for recommendation systems is how to use neural networks to accurately learn user representation vectors and item representation vectors. Many deep learning models used a single vector to represent users, but users' interests were often diverse. Therefore, some researchers consider using multiple vectors to represent user interests, and each interest vector corresponds to a category of items. This method sounds more scientific. However, these models still have problems. Their interpretation of user interests stays at the item level, and does not go deep into the item feature level. In order to solve this problem, we consider user interests from the perspective of item characteristics, and propose 3M (Multi-task, Multi-interest, Multi-feature) model. The 3M model trains multiple interest vectors for each user and extracts multiple characteristic vectors for each item at the same time, then uses a multi-task learning model to connect the characteristic vectors with the interest vectors and train them to obtain multiple interest scores. According to the multiple interest scores, the user click probability can be obtained. Experiments show that our model performs significantly better than the classic CTR(Click - Through Rate) prediction model on the experimental dataset.
在大数据时代,随着数据量的激增,信息的获取和利用变得非常困难。普通用户往往很难找到自己需要的信息或物品,个性化推荐系统可以很好地解决这个问题。目前,推荐系统越来越多地采用基于深度学习的模型。在推荐系统中使用深度学习最关键的问题是如何使用神经网络准确地学习用户表示向量和项目表示向量。许多深度学习模型使用单一向量来表示用户,但用户的兴趣往往是多种多样的。因此,一些研究者考虑使用多个向量来表示用户兴趣,每个兴趣向量对应一个类别的物品。这种方法听起来更科学。然而,这些模型仍然存在问题。他们对用户兴趣的解释停留在道具层面,而没有深入到道具功能层面。为了解决这一问题,我们从物品特征的角度考虑用户兴趣,提出了3M (Multi-task, Multi-interest, Multi-feature)模型。3M模型为每个用户训练多个兴趣向量,同时提取每个项目的多个特征向量,然后使用多任务学习模型将特征向量与兴趣向量连接并训练得到多个兴趣分数。根据多个兴趣分数,可以得到用户的点击概率。实验表明,我们的模型在实验数据集上的表现明显优于经典的CTR(点击率)预测模型。
{"title":"Multi-task Learning Model based on Multiple Characteristics and Multiple Interests for CTR prediction","authors":"Yufeng Xie, Mingchu Li, Kun Lu, Syed Bilal Hussain Shah, Xiao Zheng","doi":"10.1109/DSC54232.2022.9888898","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888898","url":null,"abstract":"In the era of big data, the acquisition and utilization of information becomes difficult with the skyrocketing amount of data. It is often difficult for ordinary users to find the in-formation or items they need, and personalized recommendation systems can solve this problem well. Currently, recommendation systems increasingly adopt models based on deep learning. The most critical issue in using deep learning for recommendation systems is how to use neural networks to accurately learn user representation vectors and item representation vectors. Many deep learning models used a single vector to represent users, but users' interests were often diverse. Therefore, some researchers consider using multiple vectors to represent user interests, and each interest vector corresponds to a category of items. This method sounds more scientific. However, these models still have problems. Their interpretation of user interests stays at the item level, and does not go deep into the item feature level. In order to solve this problem, we consider user interests from the perspective of item characteristics, and propose 3M (Multi-task, Multi-interest, Multi-feature) model. The 3M model trains multiple interest vectors for each user and extracts multiple characteristic vectors for each item at the same time, then uses a multi-task learning model to connect the characteristic vectors with the interest vectors and train them to obtain multiple interest scores. According to the multiple interest scores, the user click probability can be obtained. Experiments show that our model performs significantly better than the classic CTR(Click - Through Rate) prediction model on the experimental dataset.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129285847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Symbolon: Enabling Flexible Multi-device-based User Authentication 符号:启用灵活的基于多设备的用户认证
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888854
Thalia M. Laing, Eduard Marin, M. Ryan, Joshua Schiffman, Gaetan Wattiau
Hardware tokens are increasingly used to support second-factor and passwordless authentication schemes. While these devices improve security over weaker factors like passwords, they suffer from a number of security and practical issues. We present the design and implementation of Symbolon, a system that allows users to authenticate to an online service in a secure and flexible manner by using multiple personal devices (e.g., their smartphone and smart watch) together, in place of a password. The core idea behind Symbolon is to let users authenticate only if they carry a sufficient number of their personal devices and give explicit consent. We use threshold cryptography at the client side to protect against strong adversaries while overcoming the limitations of multi-factor authentication in terms of flexibility. Symbolon is compatible with FIDO servers, but improves the client-side experience compared to FIDO in terms of security, privacy, and user control. We design Symbolon such that the user can (i) authenticate using a flexible selection of devices, which we call “authenticators”; (ii) define fine-grained threshold policies that enforce user consent without involving or modifying online services; and (iii) add or revoke authenticators without needing to generate new cryptographic keys or manually (un)register them with online services. Finally, we present a detailed design and analyse the security, privacy and practical properties of Symbolon; this includes a formal proof using ProVerif to show the required security properties are satisfied.
硬件令牌越来越多地用于支持第二因素和无密码身份验证方案。虽然这些设备比密码等较弱的因素提高了安全性,但它们存在许多安全和实际问题。我们介绍了Symbolon的设计和实现,该系统允许用户通过使用多个个人设备(例如,他们的智能手机和智能手表)一起以安全和灵活的方式对在线服务进行身份验证,而不是密码。Symbolon背后的核心理念是,只有当用户携带足够数量的个人设备并明确表示同意时,才允许用户进行身份验证。我们在客户端使用阈值加密来抵御强大的对手,同时克服多因素身份验证在灵活性方面的限制。Symbolon与FIDO服务器兼容,但与FIDO相比,它在安全性、隐私性和用户控制方面改善了客户端体验。我们设计Symbolon,使用户可以(i)使用灵活选择的设备进行身份验证,我们称之为“身份验证器”;(ii)定义细粒度阈值策略,在不涉及或修改在线服务的情况下强制用户同意;(iii)添加或撤销身份验证器,而无需生成新的加密密钥或手动(un)向在线服务注册它们。最后,对Symbolon的安全性、隐私性和实用性进行了详细的设计和分析;这包括使用ProVerif的正式证明,以显示所需的安全属性得到满足。
{"title":"Symbolon: Enabling Flexible Multi-device-based User Authentication","authors":"Thalia M. Laing, Eduard Marin, M. Ryan, Joshua Schiffman, Gaetan Wattiau","doi":"10.1109/DSC54232.2022.9888854","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888854","url":null,"abstract":"Hardware tokens are increasingly used to support second-factor and passwordless authentication schemes. While these devices improve security over weaker factors like passwords, they suffer from a number of security and practical issues. We present the design and implementation of Symbolon, a system that allows users to authenticate to an online service in a secure and flexible manner by using multiple personal devices (e.g., their smartphone and smart watch) together, in place of a password. The core idea behind Symbolon is to let users authenticate only if they carry a sufficient number of their personal devices and give explicit consent. We use threshold cryptography at the client side to protect against strong adversaries while overcoming the limitations of multi-factor authentication in terms of flexibility. Symbolon is compatible with FIDO servers, but improves the client-side experience compared to FIDO in terms of security, privacy, and user control. We design Symbolon such that the user can (i) authenticate using a flexible selection of devices, which we call “authenticators”; (ii) define fine-grained threshold policies that enforce user consent without involving or modifying online services; and (iii) add or revoke authenticators without needing to generate new cryptographic keys or manually (un)register them with online services. Finally, we present a detailed design and analyse the security, privacy and practical properties of Symbolon; this includes a formal proof using ProVerif to show the required security properties are satisfied.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114246908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using Poisson Distribution to Enhance CNN-based NB-IoT LDoS Attack Detection 基于泊松分布增强基于cnn的NB-IoT LDoS攻击检测
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888864
Jiang Zeng, Li-En Chang, Hsin-Hung Cho, Chi-Yuan Chen, Han-Chieh Chao, Kuo-Hui Yeh
Because the hardware capabilities of narrowband IoT devices are not enough to carry powerful antivirus software or security mechanisms so that some scholars have used deep learning to help with intrusion detection. Narrowband IoT devices are more vulnerable to low-rate denial-of-service attacks due to the low upper limit of the connection rate. However, the rate and number of such attacks are not obvious. Therefore, even when training with datasets provided by large organizations, the amount of data for low-rate denial-of-service attacks is very sparse, resulting in poor detection accuracy. This study proposes an interpretable method based on statistical models to simplify the model so that it responds only to specific attacks. The experimental results show that our method can effectively detect specific attacks.
由于窄带物联网设备的硬件能力不足以承载强大的杀毒软件或安全机制,因此一些学者利用深度学习来帮助进行入侵检测。窄带物联网设备由于连接速率上限较低,更容易受到低速率拒绝服务攻击。然而,这种攻击的频率和数量并不明显。因此,即使在使用大型组织提供的数据集进行训练时,用于低速率拒绝服务攻击的数据量也非常稀疏,导致检测准确性较差。本研究提出了一种基于统计模型的可解释方法,以简化模型,使其仅响应特定的攻击。实验结果表明,该方法能够有效检测特定攻击。
{"title":"Using Poisson Distribution to Enhance CNN-based NB-IoT LDoS Attack Detection","authors":"Jiang Zeng, Li-En Chang, Hsin-Hung Cho, Chi-Yuan Chen, Han-Chieh Chao, Kuo-Hui Yeh","doi":"10.1109/DSC54232.2022.9888864","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888864","url":null,"abstract":"Because the hardware capabilities of narrowband IoT devices are not enough to carry powerful antivirus software or security mechanisms so that some scholars have used deep learning to help with intrusion detection. Narrowband IoT devices are more vulnerable to low-rate denial-of-service attacks due to the low upper limit of the connection rate. However, the rate and number of such attacks are not obvious. Therefore, even when training with datasets provided by large organizations, the amount of data for low-rate denial-of-service attacks is very sparse, resulting in poor detection accuracy. This study proposes an interpretable method based on statistical models to simplify the model so that it responds only to specific attacks. The experimental results show that our method can effectively detect specific attacks.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126112594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Facilitating Deep Learning for Edge Computing: A Case Study on Data Classification 促进边缘计算的深度学习:数据分类的案例研究
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888939
A. Alsalemi, A. Amira, H. Malekmohamadi, Kegong Diao
Deep Learning (DL) is increasingly empowering technology and engineering in a plethora of ways, especially when big data processing is a core requirement. Many challenges, however, arise when solely depending on cloud computing for Artificial Intelligence (AI), such as data privacy, communication latency, and power consumption. Despite the elevating popularity of edge computing, its overarching issue is not the lack of technical specifications in many edge computing platforms but the sparsity of comprehensive documentation on how to correct utilize hardware to run ML and DL algorithms. Due to its specialized nature, installing the full version of TensorFlow, a common ML library, on an edge device is a complicated procedure that is seldom successful, due to the many dependent software libraries needed to be compatible with varying architectures of edge computing devices. Henceforth, in this paper, we present a novel technical guide on setting up the TensorFlow Lite, a lightweight version of TensorFlow, and demonstrate a complete workflow of model training, validation, and testing on the ODROID-XU4. Results are presented for a case study on energy data classification using the outlined model show almost 7 times higher computational performance compared to cloud-based AI.
深度学习(DL)正以多种方式日益增强技术和工程的能力,尤其是当大数据处理成为核心需求时。然而,当人工智能(AI)完全依赖云计算时,会出现许多挑战,例如数据隐私、通信延迟和功耗。尽管边缘计算越来越受欢迎,但其首要问题不是许多边缘计算平台缺乏技术规范,而是关于如何正确利用硬件运行ML和DL算法的综合文档的稀疏性。由于其特殊性,在边缘设备上安装完整版本的TensorFlow(一个通用的ML库)是一个复杂的过程,很少成功,因为许多依赖的软件库需要与边缘计算设备的不同架构兼容。因此,在本文中,我们提出了一个关于设置TensorFlow Lite (TensorFlow的轻量级版本)的新技术指南,并在ODROID-XU4上演示了一个完整的模型训练、验证和测试工作流。使用概述模型进行能源数据分类的案例研究结果显示,与基于云的人工智能相比,计算性能提高了近7倍。
{"title":"Facilitating Deep Learning for Edge Computing: A Case Study on Data Classification","authors":"A. Alsalemi, A. Amira, H. Malekmohamadi, Kegong Diao","doi":"10.1109/DSC54232.2022.9888939","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888939","url":null,"abstract":"Deep Learning (DL) is increasingly empowering technology and engineering in a plethora of ways, especially when big data processing is a core requirement. Many challenges, however, arise when solely depending on cloud computing for Artificial Intelligence (AI), such as data privacy, communication latency, and power consumption. Despite the elevating popularity of edge computing, its overarching issue is not the lack of technical specifications in many edge computing platforms but the sparsity of comprehensive documentation on how to correct utilize hardware to run ML and DL algorithms. Due to its specialized nature, installing the full version of TensorFlow, a common ML library, on an edge device is a complicated procedure that is seldom successful, due to the many dependent software libraries needed to be compatible with varying architectures of edge computing devices. Henceforth, in this paper, we present a novel technical guide on setting up the TensorFlow Lite, a lightweight version of TensorFlow, and demonstrate a complete workflow of model training, validation, and testing on the ODROID-XU4. Results are presented for a case study on energy data classification using the outlined model show almost 7 times higher computational performance compared to cloud-based AI.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121961677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
How National CSIRTs Operate: Personal Observations and Opinions from MyCERT 国家csirt如何运作:来自MyCERT的个人观察和意见
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888803
Sharifah Roziah Mohd Kassim, Solahuddin Bin Shamsuddin, Shujun Li, B. Arief
Computer Security Incident Response Teams (CSIRTs) have been established at national and organisational levels to respond to and mitigate cyber incidents. National CSIRTs play a critical role in defending a nation's infrastructure from cyber attacks. However, the research literature lacks studies that can provide first-hand insights on current operational practices in national CSIRTs and challenges faced by staff at national CSIRTs. This paper provides personal observations and opinions from two members of staff at MyCERT (Malaysia's national CSIRT), regarding important areas of national CSIRTs' operational practices including cross-CSIRT collaboration, the lack of systematic use of data and tools, and the lack of evaluation of data and tools used. We hope this paper can help stimulate more research and work to address some of the gaps we identified.
在国家和组织层面建立了计算机安全事件响应小组(csirt),以响应和减轻网络事件。国家csirt在保护国家基础设施免受网络攻击方面发挥着关键作用。然而,研究文献缺乏能够提供关于国家csirt当前操作实践和国家csirt工作人员面临的挑战的第一手见解的研究。本文提供了MyCERT(马来西亚国家CSIRT)的两名工作人员的个人观察和意见,涉及国家CSIRT运营实践的重要领域,包括跨CSIRT合作,缺乏系统的数据和工具使用,以及缺乏对所使用的数据和工具的评估。我们希望这篇论文可以帮助激发更多的研究和工作,以解决我们发现的一些差距。
{"title":"How National CSIRTs Operate: Personal Observations and Opinions from MyCERT","authors":"Sharifah Roziah Mohd Kassim, Solahuddin Bin Shamsuddin, Shujun Li, B. Arief","doi":"10.1109/DSC54232.2022.9888803","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888803","url":null,"abstract":"Computer Security Incident Response Teams (CSIRTs) have been established at national and organisational levels to respond to and mitigate cyber incidents. National CSIRTs play a critical role in defending a nation's infrastructure from cyber attacks. However, the research literature lacks studies that can provide first-hand insights on current operational practices in national CSIRTs and challenges faced by staff at national CSIRTs. This paper provides personal observations and opinions from two members of staff at MyCERT (Malaysia's national CSIRT), regarding important areas of national CSIRTs' operational practices including cross-CSIRT collaboration, the lack of systematic use of data and tools, and the lack of evaluation of data and tools used. We hope this paper can help stimulate more research and work to address some of the gaps we identified.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"28 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121896987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Malicious and Benign URL Dataset Generation Using Character-Level LSTM Models 使用字符级LSTM模型生成恶意和良性URL数据集
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888835
Spencer Vecile, Kyle Lacroix, Katarina Grolinger, J. Samarabandu
As technologies advance, so do the attacks on them. Cybersecurity plays a significant role in society to protect everyone. Malicious URLs are links designed to promote scams, attacks, and frauds. Companies often have web filtering algorithms that will blacklist specific URLs as malicious; however, due to privacy concerns, they will not give outside entities access to their cybersecurity data. Unfortunately, this lack of data creates a dire need for more data in cybersecurity research and machine learning applications. This paper proposes using machine learning to generate new synthetic URLs characteristically indistinguishable from the data they replace. To do this two character-level long short-term memory (LSTM) models were trained, one to generate malicious URLs and one to generate benign URLs. To assess the quality of the synthetic data two tests were performed. (1) Classify the URLs into malicious and benign to ensure the characteristics of the original data were preserved. (2) Use the Levenstein ratio to check the similarity between the real and synthetic URLs to ensure sufficient anonymization. The results from the classification test show that the synthetic data classifier only slightly underperformed the real data classifier; however, with having accuracy, precision, recall, sensitivity, and specificity above 99%, it can be concluded that the characteristics of the malicious and benign URLs were preserved. The Levenstein ratio tests showed a mean of 67% and 79% similarity for the benign and malicious URLs, respectively. In the end, the character-level LSTM model successfully generated an anonymized, synthetic dataset, that was characteristically similar to the original, which could pave the way for the publication of many more datasets in this way.
随着技术的进步,对它们的攻击也在不断发展。网络安全在保护每个人的社会中发挥着重要作用。恶意url是旨在促进诈骗、攻击和欺诈的链接。公司通常有网络过滤算法,将特定的url列入恶意黑名单;然而,出于隐私考虑,他们不会让外部实体访问他们的网络安全数据。不幸的是,这种数据的缺乏使得网络安全研究和机器学习应用迫切需要更多的数据。本文提出使用机器学习来生成新的合成url,其特征与它们所替换的数据无法区分。为此,训练了两个字符级长短期记忆(LSTM)模型,一个用于生成恶意url,另一个用于生成良性url。为了评估合成数据的质量,进行了两项试验。(1)将url分为恶意和良性,保证原始数据的特征被保留。(2)使用Levenstein比率检查真实url和合成url的相似度,以确保足够的匿名化。分类测试结果表明,合成数据分类器的性能仅略低于真实数据分类器;但准确率、精密度、查全率、灵敏度、特异度均在99%以上,可以认为保留了恶意和良性url的特征。Levenstein比率测试显示,良性和恶意url的平均相似度分别为67%和79%。最后,字符级LSTM模型成功地生成了一个匿名的合成数据集,该数据集的特征与原始数据集相似,这可以为以这种方式发布更多数据集铺平道路。
{"title":"Malicious and Benign URL Dataset Generation Using Character-Level LSTM Models","authors":"Spencer Vecile, Kyle Lacroix, Katarina Grolinger, J. Samarabandu","doi":"10.1109/DSC54232.2022.9888835","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888835","url":null,"abstract":"As technologies advance, so do the attacks on them. Cybersecurity plays a significant role in society to protect everyone. Malicious URLs are links designed to promote scams, attacks, and frauds. Companies often have web filtering algorithms that will blacklist specific URLs as malicious; however, due to privacy concerns, they will not give outside entities access to their cybersecurity data. Unfortunately, this lack of data creates a dire need for more data in cybersecurity research and machine learning applications. This paper proposes using machine learning to generate new synthetic URLs characteristically indistinguishable from the data they replace. To do this two character-level long short-term memory (LSTM) models were trained, one to generate malicious URLs and one to generate benign URLs. To assess the quality of the synthetic data two tests were performed. (1) Classify the URLs into malicious and benign to ensure the characteristics of the original data were preserved. (2) Use the Levenstein ratio to check the similarity between the real and synthetic URLs to ensure sufficient anonymization. The results from the classification test show that the synthetic data classifier only slightly underperformed the real data classifier; however, with having accuracy, precision, recall, sensitivity, and specificity above 99%, it can be concluded that the characteristics of the malicious and benign URLs were preserved. The Levenstein ratio tests showed a mean of 67% and 79% similarity for the benign and malicious URLs, respectively. In the end, the character-level LSTM model successfully generated an anonymized, synthetic dataset, that was characteristically similar to the original, which could pave the way for the publication of many more datasets in this way.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122235087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE Conference on Dependable and Secure Computing (DSC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1