首页 > 最新文献

Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.最新文献

英文 中文
Preventing theft of quality of service on open platforms 防止盗窃开放平台的服务质量
Kwang-Hyun Baek, Sean W. Smith
As multiple types of traffic converge onto one network, frequently wireless, enterprises face a tradeoff between effectiveness and security. Some types of traffic, such as voice-over-IP (VoIP), require certain quality of service (QoS) guarantees to be effective. The end client platform is in the best position to know which packets deserve this special handling. In many environments (such as universities), end users relish having control over their own machines. However, if end users administer their own machines, nothing stops dishonest ones from marking undeserving traffic for high QoS. How can an enterprise ensure that only appropriate traffic receives high QoS, while also allowing end users to retain control over their own machines? In this paper, we present the design and prototype of a solution, using SELinux, TCPA/TCG hardware, Diffserv, 802.1x, and EAP-TLS.
随着多种类型的流量汇聚到一个网络(通常是无线网络),企业面临着有效性和安全性之间的权衡。某些类型的流量,如ip语音(VoIP),需要一定的服务质量(QoS)保证才能有效。终端客户端平台是知道哪些数据包值得这种特殊处理的最佳位置。在许多环境中(如大学),最终用户喜欢控制自己的机器。然而,如果最终用户管理他们自己的机器,没有什么可以阻止不诚实的人将不值得的流量标记为高QoS。企业如何确保只有适当的流量才能获得高QoS,同时还允许最终用户保留对自己机器的控制?在本文中,我们提出了一个解决方案的设计和原型,使用SELinux, TCPA/TCG硬件,Diffserv, 802.1x和EAP-TLS。
{"title":"Preventing theft of quality of service on open platforms","authors":"Kwang-Hyun Baek, Sean W. Smith","doi":"10.1109/SECCMW.2005.1588319","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588319","url":null,"abstract":"As multiple types of traffic converge onto one network, frequently wireless, enterprises face a tradeoff between effectiveness and security. Some types of traffic, such as voice-over-IP (VoIP), require certain quality of service (QoS) guarantees to be effective. The end client platform is in the best position to know which packets deserve this special handling. In many environments (such as universities), end users relish having control over their own machines. However, if end users administer their own machines, nothing stops dishonest ones from marking undeserving traffic for high QoS. How can an enterprise ensure that only appropriate traffic receives high QoS, while also allowing end users to retain control over their own machines? In this paper, we present the design and prototype of a solution, using SELinux, TCPA/TCG hardware, Diffserv, 802.1x, and EAP-TLS.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127441468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Design and implementation of a tunable encryption service for networked applications 为网络应用程序设计和实现可调加密服务
S. Lindskog, A. Brunstrom
To achieve the best possible QoS tradeoff between security and performance for networked applications, a tunable and differential treatment of security is required. In this paper, we present the design and implementation of a tunable encryption service. The proposed service is based on a selective encryption paradigm in which the applications can request a desired encryption level. Encryption levels are selected by the applications at the inception of sessions, but can be changed at any time during their lifetime. A prototype implementation is described along with an initial performance evaluation. The experimental results demonstrate that the proposed service offers a high degree of security adaptiveness at a low cost.
为了在网络应用程序的安全性和性能之间实现最好的QoS折衷,需要对安全性进行可调的区别处理。在本文中,我们提出了一个可调加密服务的设计和实现。所建议的服务基于可选择的加密范例,其中应用程序可以请求所需的加密级别。加密级别由应用程序在会话开始时选择,但可以在其生命周期中的任何时间更改。描述了原型实现以及初始性能评估。实验结果表明,该服务以较低的成本提供了高度的安全自适应。
{"title":"Design and implementation of a tunable encryption service for networked applications","authors":"S. Lindskog, A. Brunstrom","doi":"10.1109/SECCMW.2005.1588320","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588320","url":null,"abstract":"To achieve the best possible QoS tradeoff between security and performance for networked applications, a tunable and differential treatment of security is required. In this paper, we present the design and implementation of a tunable encryption service. The proposed service is based on a selective encryption paradigm in which the applications can request a desired encryption level. Encryption levels are selected by the applications at the inception of sessions, but can be changed at any time during their lifetime. A prototype implementation is described along with an initial performance evaluation. The experimental results demonstrate that the proposed service offers a high degree of security adaptiveness at a low cost.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130962958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A comprehensive reputation-based trust model for distributed systems 分布式系统基于声誉的综合信任模型
Ayman Tajeddine, A. Kayssi, A. Chehab, H. Artail
In this paper, we present a general and comprehensive reputation-based trust model for distributed computing. The proposed model is an enhancement over our previous model, TRUMMAR, and aims at achieving a truly unique model that incorporates most concepts that are essential to determining trust-based decisions. Among the concepts upon which the trust model is based are reputation values, direct experiences, trust in the credibility of a host to give recommendations, decay of information with time based on a dynamic decay factor, first impressions, similarity, popularity, activity, cooperation between hosts, in addition to a hierarchy of host systems. The simulations performed on this model confirm its correctness and its adaptability to different environments and situations.
在本文中,我们提出了一个通用的、全面的基于信誉的分布式计算信任模型。提出的模型是对我们之前的模型TRUMMAR的改进,旨在实现一个真正独特的模型,该模型包含了确定基于信任的决策所必需的大多数概念。信任模型所基于的概念包括声誉值、直接经验、对主持人提供推荐的可信度的信任、基于动态衰减因子的信息随时间衰减、第一印象、相似性、受欢迎程度、活动、主持人之间的合作,以及主持人系统的层次结构。通过仿真验证了该模型的正确性和对不同环境和情况的适应性。
{"title":"A comprehensive reputation-based trust model for distributed systems","authors":"Ayman Tajeddine, A. Kayssi, A. Chehab, H. Artail","doi":"10.1109/SECCMW.2005.1588304","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588304","url":null,"abstract":"In this paper, we present a general and comprehensive reputation-based trust model for distributed computing. The proposed model is an enhancement over our previous model, TRUMMAR, and aims at achieving a truly unique model that incorporates most concepts that are essential to determining trust-based decisions. Among the concepts upon which the trust model is based are reputation values, direct experiences, trust in the credibility of a host to give recommendations, decay of information with time based on a dynamic decay factor, first impressions, similarity, popularity, activity, cooperation between hosts, in addition to a hierarchy of host systems. The simulations performed on this model confirm its correctness and its adaptability to different environments and situations.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131759219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Comparison of security protocols in mobile wireless environments: tradeoffs between level of security obtained and battery life 移动无线环境中安全协议的比较:获得的安全级别和电池寿命之间的权衡
Fernando C Colón Osorio, Kerry Mckay, Emmanuel Agu
As the popularity of wireless networks increases, so does the need to protect them. In recent years, many researchers have studied the limitations of the security mechanisms that protect wireless networks, as well as the effects of network traffic on the battery life. However, there has been less research on the effect of adding security mechanisms to mobile devices and their impact on energy usage. This is a particularly important area when one considers classes of attacks where an attacker can drain a device's battery by simply having it repeatedly execute energy intensive programs. In this manuscript, we examine a method for analyzing trade-offs between energy and security proposed by Colo/spl acute/n Osorio et al. This research describes a method to identify the most appropriate security profile for a given application, given battery constraints. We apply this methodology to the analysis of tradeoffs between energy utilization and security of current and proposed wireless protocols.
随着无线网络的普及,保护它们的需求也在增加。近年来,许多研究人员研究了保护无线网络的安全机制的局限性,以及网络流量对电池寿命的影响。然而,关于在移动设备中添加安全机制的影响及其对能源使用的影响的研究较少。这是一个特别重要的领域,当人们考虑攻击者可以通过简单地让设备重复执行能源密集型程序来耗尽设备电池的攻击类别时。在本文中,我们研究了Colo/spl acute/n Osorio等人提出的一种分析能源与安全之间权衡的方法。本研究描述了一种方法,以确定最合适的安全配置文件为给定的应用程序,给定电池的限制。我们将这种方法应用于当前和提议的无线协议的能源利用和安全性之间的权衡分析。
{"title":"Comparison of security protocols in mobile wireless environments: tradeoffs between level of security obtained and battery life","authors":"Fernando C Colón Osorio, Kerry Mckay, Emmanuel Agu","doi":"10.1109/SECCMW.2005.1588322","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588322","url":null,"abstract":"As the popularity of wireless networks increases, so does the need to protect them. In recent years, many researchers have studied the limitations of the security mechanisms that protect wireless networks, as well as the effects of network traffic on the battery life. However, there has been less research on the effect of adding security mechanisms to mobile devices and their impact on energy usage. This is a particularly important area when one considers classes of attacks where an attacker can drain a device's battery by simply having it repeatedly execute energy intensive programs. In this manuscript, we examine a method for analyzing trade-offs between energy and security proposed by Colo/spl acute/n Osorio et al. This research describes a method to identify the most appropriate security profile for a given application, given battery constraints. We apply this methodology to the analysis of tradeoffs between energy utilization and security of current and proposed wireless protocols.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123287141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
New approach for selfish nodes detection in mobile ad hoc networks 移动自组网中自利节点检测的新方法
D. Djenouri, N. Badache
A mobile ad hoc network (MANET) is a temporary infrastructureless network, formed by a set of mobile hosts that dynamically establish their own network on the fly without relying on any central administration. Mobile hosts used in MANET have to ensure the services that were ensured by the powerful fixed infrastructure in traditional networks, the packet forwarding is one of these services. The resource limitation of nodes used in MANET, particularly in energy supply, along with the multi-hop nature of this network may cause new phenomena which do not exist in traditional networks. To save its energy a node may behave selfishly and uses the forwarding service of other nodes without correctly forwarding packets for them. This deviation from the correct behavior represents a potential threat against the quality of service (QoS), as well as the service availability, one of the most important security requirements. Some solutions have been recently proposed, but almost all these solutions rely on the watchdog technique as stated in S. Marti et al. (2000) in their monitoring components, which suffers from many problems. In this paper we propose an approach to mitigate some of these problems, and we assess its performance by simulation.
移动自组织网络(MANET)是一种临时的无基础设施网络,由一组移动主机组成,这些主机动态地建立自己的网络,而不依赖于任何中央管理。在MANET中使用的移动主机必须保证传统网络中由强大的固定基础设施所保证的服务,数据包转发就是这些服务之一。MANET中节点资源的有限性,特别是能量供应的有限性,以及该网络的多跳特性,可能会导致传统网络中不存在的新现象。为了节省自己的能量,一个节点可能表现得很自私,使用其他节点的转发服务,而不正确地为其他节点转发数据包。这种对正确行为的偏离表示对服务质量(QoS)以及服务可用性(最重要的安全需求之一)的潜在威胁。最近提出了一些解决方案,但几乎所有这些解决方案都依赖于S. Marti等人(2000)在其监测组件中所述的看门狗技术,这种技术存在许多问题。在本文中,我们提出了一种方法来缓解这些问题,并通过仿真来评估其性能。
{"title":"New approach for selfish nodes detection in mobile ad hoc networks","authors":"D. Djenouri, N. Badache","doi":"10.1109/SECCMW.2005.1588323","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588323","url":null,"abstract":"A mobile ad hoc network (MANET) is a temporary infrastructureless network, formed by a set of mobile hosts that dynamically establish their own network on the fly without relying on any central administration. Mobile hosts used in MANET have to ensure the services that were ensured by the powerful fixed infrastructure in traditional networks, the packet forwarding is one of these services. The resource limitation of nodes used in MANET, particularly in energy supply, along with the multi-hop nature of this network may cause new phenomena which do not exist in traditional networks. To save its energy a node may behave selfishly and uses the forwarding service of other nodes without correctly forwarding packets for them. This deviation from the correct behavior represents a potential threat against the quality of service (QoS), as well as the service availability, one of the most important security requirements. Some solutions have been recently proposed, but almost all these solutions rely on the watchdog technique as stated in S. Marti et al. (2000) in their monitoring components, which suffers from many problems. In this paper we propose an approach to mitigate some of these problems, and we assess its performance by simulation.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125149023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Security and quality of service in communication networks 通信网络的安全性和服务质量
Wenye Wang, C. Costa
With the ubiquitous reach of the Internet, providing secure services over the communication networks has induced more challenges in addition to the requirements of quality of service (QoS) of a wide variety of applications. More importantly, security mechanisms, such as authentication, trust management, and key distribution are deployed at the expense of QoS because of implementation and communication overhead. Therefore, there exists a need for network designers to integrate security protocols in the Internet, while providing the required QoS in terms of bandwidth, delay, jitter, and reliability. A similar increase in wireless networks spanning from sensor networks to cellular systems has also demanded stringent tradeoff between security services and QoS. Both these factors have resulted in a sharply growing demand by service providers for the development of techniques that will enable them to offer communication services adaptive to voice and data services. Therefore, design and evaluation of security protocols and mechanisms for different network architectures and applications becomes a fundamental issue in providing secure, reliable, and satisfactory communications.
随着Internet的普及,除了对各种应用的服务质量(QoS)的要求外,在通信网络上提供安全服务也引发了更多的挑战。更重要的是,由于实现和通信开销,安全机制(如身份验证、信任管理和密钥分发)的部署是以牺牲QoS为代价的。因此,网络设计者需要在Internet中集成安全协议,同时在带宽、延迟、抖动和可靠性方面提供所需的QoS。从传感器网络到蜂窝系统的无线网络的类似增长也要求在安全服务和QoS之间进行严格的权衡。这两个因素导致服务提供商对开发技术的需求急剧增长,这些技术将使他们能够提供适应语音和数据服务的通信服务。因此,设计和评估不同网络体系结构和应用程序的安全协议和机制成为提供安全、可靠和令人满意的通信的基本问题。
{"title":"Security and quality of service in communication networks","authors":"Wenye Wang, C. Costa","doi":"10.1109/SECCMW.2005.1588310","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588310","url":null,"abstract":"With the ubiquitous reach of the Internet, providing secure services over the communication networks has induced more challenges in addition to the requirements of quality of service (QoS) of a wide variety of applications. More importantly, security mechanisms, such as authentication, trust management, and key distribution are deployed at the expense of QoS because of implementation and communication overhead. Therefore, there exists a need for network designers to integrate security protocols in the Internet, while providing the required QoS in terms of bandwidth, delay, jitter, and reliability. A similar increase in wireless networks spanning from sensor networks to cellular systems has also demanded stringent tradeoff between security services and QoS. Both these factors have resulted in a sharply growing demand by service providers for the development of techniques that will enable them to offer communication services adaptive to voice and data services. Therefore, design and evaluation of security protocols and mechanisms for different network architectures and applications becomes a fundamental issue in providing secure, reliable, and satisfactory communications.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128187190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerabilities in SOHO VoIP gateways SOHO VoIP网关的漏洞
P. Thermos, G. Hadsall
The technological advancements and equipment cost reductions, aid in the rapid evolution of residential networks, which evolved in to an autonomous ecosystem with more elaborate services and capabilities than previously experienced. The elements in the residential networks are using a combination of hardware, software and communication protocols with inherent security vulnerabilities due to this new configuration. One such component is the voice over IP (VoIP) gateway, which in many cases is replacing the current Internet gateway thus providing network as well as VoIP connectivity. The new VoIP gateways are required to provide greater robustness and security than the current Internet gateways since they need to support critical services such as E911 and real-time multimedia applications. This paper reflects the results of a research study that aimed at identifying security issues associated with residential VoIP gateways, including signaling and media routing, implementation, operation, and network management in order to understand their impact on end users and service providers. The findings suggest that attacks such as message, replay, amplification (i.e. Denial of Service or "DoS" ), annoyance (SPIT), and eavesdropping along with misconfiguration and several other weaknesses can have a severe impact on the subscriber's ability to communicate in an emergency or disclosure of sensitive information.
技术的进步和设备成本的降低有助于住宅网络的快速发展,住宅网络已经发展成为一个自主的生态系统,拥有比以前更复杂的服务和功能。由于这种新的配置,住宅网络中的元素正在使用硬件、软件和通信协议的组合,这些协议存在固有的安全漏洞。其中一个组件是IP语音(VoIP)网关,它在许多情况下取代了当前的互联网网关,从而提供网络和VoIP连接。由于VoIP网关需要支持E911等关键业务和实时多媒体应用,因此需要提供比现有Internet网关更高的鲁棒性和安全性。本文反映了一项研究的结果,该研究旨在确定与住宅VoIP网关相关的安全问题,包括信令和媒体路由、实施、运营和网络管理,以了解它们对最终用户和服务提供商的影响。研究结果表明,诸如消息、重播、放大(即拒绝服务或“DoS”)、烦恼(SPIT)、窃听以及错误配置和其他几个弱点等攻击,可能会严重影响订阅者在紧急情况下的通信能力或敏感信息的披露。
{"title":"Vulnerabilities in SOHO VoIP gateways","authors":"P. Thermos, G. Hadsall","doi":"10.1109/SECCMW.2005.1588318","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588318","url":null,"abstract":"The technological advancements and equipment cost reductions, aid in the rapid evolution of residential networks, which evolved in to an autonomous ecosystem with more elaborate services and capabilities than previously experienced. The elements in the residential networks are using a combination of hardware, software and communication protocols with inherent security vulnerabilities due to this new configuration. One such component is the voice over IP (VoIP) gateway, which in many cases is replacing the current Internet gateway thus providing network as well as VoIP connectivity. The new VoIP gateways are required to provide greater robustness and security than the current Internet gateways since they need to support critical services such as E911 and real-time multimedia applications. This paper reflects the results of a research study that aimed at identifying security issues associated with residential VoIP gateways, including signaling and media routing, implementation, operation, and network management in order to understand their impact on end users and service providers. The findings suggest that attacks such as message, replay, amplification (i.e. Denial of Service or \"DoS\" ), annoyance (SPIT), and eavesdropping along with misconfiguration and several other weaknesses can have a severe impact on the subscriber's ability to communicate in an emergency or disclosure of sensitive information.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129650453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security analysis and solutions for deploying IP telephony in the critical infrastructure 在关键基础设施中部署IP电话的安全分析和解决方案
Feng Cao, S. Malik
Voice over IP (VoIP) is being adopted to replace the traditional circuit switched infrastructure for telephony services. This trend has an enormous impact on the critical infrastructure sectors which will progressively become more dependent in part or as a whole on VoIP services. Phone communications and its security is a relevant concern for most critical infrastructure sector organizations today. With passage of time this concern will morph into a new set of challenges and opportunities brought forward by the deployment of VoIP in these organizations. This study attempts to outline the potential security issues faced by the critical infrastructure sectors as they transform their traditional phone systems into VoIP systems. Security analysis is provided to understand the impact of VoIP security challenges in the new convergent network paradigm. Some recommendations are made on how to address many issues of VoIP security along the process of adopting IP telephony into critical infrastructure.
IP语音(VoIP)正在被用来取代传统的电路交换基础设施来提供电话服务。这一趋势对关键基础设施部门产生了巨大的影响,这些部门将逐渐部分或整体地依赖VoIP服务。电话通信及其安全性是当今大多数关键基础设施部门组织关心的相关问题。随着时间的推移,这种担忧将转变为在这些组织中部署VoIP所带来的一系列新的挑战和机遇。本研究试图概述关键基础设施部门在将传统电话系统转变为VoIP系统时所面临的潜在安全问题。本文提供了安全分析,以了解在新的融合网络范式中VoIP安全挑战的影响。在将IP电话应用于关键基础设施的过程中,对如何解决VoIP安全问题提出了一些建议。
{"title":"Security analysis and solutions for deploying IP telephony in the critical infrastructure","authors":"Feng Cao, S. Malik","doi":"10.1109/SECCMW.2005.1588311","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588311","url":null,"abstract":"Voice over IP (VoIP) is being adopted to replace the traditional circuit switched infrastructure for telephony services. This trend has an enormous impact on the critical infrastructure sectors which will progressively become more dependent in part or as a whole on VoIP services. Phone communications and its security is a relevant concern for most critical infrastructure sector organizations today. With passage of time this concern will morph into a new set of challenges and opportunities brought forward by the deployment of VoIP in these organizations. This study attempts to outline the potential security issues faced by the critical infrastructure sectors as they transform their traditional phone systems into VoIP systems. Security analysis is provided to understand the impact of VoIP security challenges in the new convergent network paradigm. Some recommendations are made on how to address many issues of VoIP security along the process of adopting IP telephony into critical infrastructure.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128537262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Leakage of classified information by e-mail: a case study 电子邮件泄露机密信息:个案研究
M. T. Pereira
In this paper we report a police operation referring to the leakage of classified information by e-mail, supposedly from inside a federal institution to a company under scrutiny by that institution, describing the investigations from the expert point of view.
在本文中,我们报道了一起警方行动,涉及通过电子邮件泄露机密信息,据称是从联邦机构内部泄露到该机构审查的公司,并从专家的角度描述了调查。
{"title":"Leakage of classified information by e-mail: a case study","authors":"M. T. Pereira","doi":"10.1109/SECCMW.2005.1588289","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588289","url":null,"abstract":"In this paper we report a police operation referring to the leakage of classified information by e-mail, supposedly from inside a federal institution to a company under scrutiny by that institution, describing the investigations from the expert point of view.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125927297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards ubiquitous cooperative security 走向无处不在的合作安全
P. Robinson
As computer and information systems are now more ubiquitous than humans, so too are the computer-to- computer threats to security and sabotage as compared to purely human-to-human. In everyday life we rely and maintain strong relationships in order to have better guarantees about personal security, as well as to be informed about potentially bad choices for relationships. This paper proposes some logical reasoning, architecture and protocols for providing similar cooperative security infrastructure for ubiquitous computer and information systems.
由于计算机和信息系统现在比人类更普遍,因此,与纯粹的人与人之间相比,计算机对计算机的安全威胁和破坏也是如此。在日常生活中,我们依赖并维持牢固的人际关系,以便更好地保障个人安全,同时了解人际关系中可能出现的不良选择。本文提出了一些逻辑推理、体系结构和协议,为泛在计算机和信息系统提供类似的协同安全基础设施。
{"title":"Towards ubiquitous cooperative security","authors":"P. Robinson","doi":"10.1109/SECCMW.2005.1588301","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588301","url":null,"abstract":"As computer and information systems are now more ubiquitous than humans, so too are the computer-to- computer threats to security and sabotage as compared to purely human-to-human. In everyday life we rely and maintain strong relationships in order to have better guarantees about personal security, as well as to be informed about potentially bad choices for relationships. This paper proposes some logical reasoning, architecture and protocols for providing similar cooperative security infrastructure for ubiquitous computer and information systems.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131244190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1