首页 > 最新文献

Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.最新文献

英文 中文
Investigating real-time system forensics 调查实时系统取证
J. Sremack
Forensic investigations of real-time systems should differ from those of traditional systems. Real-time systems are unique in their requirements and specifications, and this uniqueness presents new challenges for forensic investigations. The ubiquity of real-time systems, coupled with their inherent differences, demands that a new, real-time system-specific forensic investigation framework be developed. This paper highlights the importance of real-time systems and the differences from traditional systems with respect to forensic investigations. From that discussion, a basis for conducting real-time system investigations is presented, along with an example scenario.
实时系统的取证调查应与传统系统的取证调查有所不同。实时系统在其要求和规范方面是独特的,这种独特性给法医调查带来了新的挑战。实时系统的无所不在,加上它们固有的差异,要求开发一个新的,实时系统特定的法医调查框架。本文强调了实时系统的重要性以及与传统系统在法医调查方面的区别。从这个讨论中,提出了进行实时系统调查的基础,以及一个示例场景。
{"title":"Investigating real-time system forensics","authors":"J. Sremack","doi":"10.1109/SECCMW.2005.1588291","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588291","url":null,"abstract":"Forensic investigations of real-time systems should differ from those of traditional systems. Real-time systems are unique in their requirements and specifications, and this uniqueness presents new challenges for forensic investigations. The ubiquity of real-time systems, coupled with their inherent differences, demands that a new, real-time system-specific forensic investigation framework be developed. This paper highlights the importance of real-time systems and the differences from traditional systems with respect to forensic investigations. From that discussion, a basis for conducting real-time system investigations is presented, along with an example scenario.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"347 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133807921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Computational complexity of one reputation metric 一个信誉度量的计算复杂度
V. Grishchenko
This article addresses a problem of practical computation of a previously defined (Grischenko, 2004) reputation metric in P2P (peer-to-peer) environments. This problem turns out to be identical to a very generic all-pairs-shortest-paths problem (APSP) calculated in a distributed environment. An algorithm of practically acceptable computational cost is introduced and analyzed.
本文解决了在P2P(点对点)环境中对先前定义的(Grischenko, 2004)声誉度量进行实际计算的问题。这个问题与在分布式环境中计算的非常通用的全对最短路径问题(APSP)相同。介绍并分析了一种计算成本实际可接受的算法。
{"title":"Computational complexity of one reputation metric","authors":"V. Grishchenko","doi":"10.1109/SECCMW.2005.1588305","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588305","url":null,"abstract":"This article addresses a problem of practical computation of a previously defined (Grischenko, 2004) reputation metric in P2P (peer-to-peer) environments. This problem turns out to be identical to a very generic all-pairs-shortest-paths problem (APSP) calculated in a distributed environment. An algorithm of practically acceptable computational cost is introduced and analyzed.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122611718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance evaluation of a self-evolving trust building framework 自进化信任构建框架的绩效评估
G. Marias, V. Tsetsos, O. Sekkas, P. Georgiadis
A self-evolving reputation scheme for trust establishment in distributed peer networks is presented and evaluated. The framework, called ad-hoc trust framework (ATF), incorporates subjective behavior of end-users, direct observations of behaviors, recommendations, and history of evidences to assess the trustworthiness of peer entities. It considers several idiosyncrasies of the wireless self-organized networks, such as lack of computational resources. ATF is associated with a generic model for the evaluation of the trustworthiness of adjacent or distant nodes. It relies on a sophisticated reputation method, called trustspan, to contact only trusted peers for recommendations, and, thus, it minimizes communication costs for trust building, accelerating the trust evolution process. To evaluate the performance of the ATF framework we have deployed a large number of simulation scenarios. The performance assessment results show that ATF achieves to rapidly identify selfish nodes with high accuracy, and with relatively low communication costs.
提出并评估了一种用于分布式对等网络信任建立的自进化信誉方案。该框架被称为特设信任框架(ATF),它结合了最终用户的主观行为、对行为的直接观察、建议和证据历史,以评估对等实体的可信度。它考虑了无线自组织网络的几个特点,如缺乏计算资源。ATF与一个通用模型相关联,用于评估相邻或远程节点的可信度。它依赖于一种称为trustspan的复杂声誉方法,仅与受信任的同行联系以获得推荐,因此,它最大限度地减少了信任建立的通信成本,加速了信任演变过程。为了评估ATF框架的性能,我们部署了大量的仿真场景。性能评估结果表明,该算法能够快速、准确地识别自利节点,且通信成本相对较低。
{"title":"Performance evaluation of a self-evolving trust building framework","authors":"G. Marias, V. Tsetsos, O. Sekkas, P. Georgiadis","doi":"10.1109/SECCMW.2005.1588306","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588306","url":null,"abstract":"A self-evolving reputation scheme for trust establishment in distributed peer networks is presented and evaluated. The framework, called ad-hoc trust framework (ATF), incorporates subjective behavior of end-users, direct observations of behaviors, recommendations, and history of evidences to assess the trustworthiness of peer entities. It considers several idiosyncrasies of the wireless self-organized networks, such as lack of computational resources. ATF is associated with a generic model for the evaluation of the trustworthiness of adjacent or distant nodes. It relies on a sophisticated reputation method, called trustspan, to contact only trusted peers for recommendations, and, thus, it minimizes communication costs for trust building, accelerating the trust evolution process. To evaluate the performance of the ATF framework we have deployed a large number of simulation scenarios. The performance assessment results show that ATF achieves to rapidly identify selfish nodes with high accuracy, and with relatively low communication costs.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132137400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Modeling the network forensics behaviors 网络取证行为建模
Wei Ren, Hai Jin
Network forensics is a new coming approach to the network security. However, this field is not very clear to the new researchers. In this paper, we discuss the network forensics behaviors systematically from both the technical view and legal view. The goal of discussion is to outline the formalization and standardization of the network forensics behaviors. To our knowledge, this is the first time to comprehensively discuss the network forensics model and its fundamental fields, such as taxonomy, conceptual model, legal principles, key techniques, canonical processes and its accessory facilities and systems - network forensics system architecture and deployment. These discussions will give the guidance to the standardization of network forensics processes and the implementation of prototype system.
网络取证是一种新兴的网络安全手段。然而,这个领域对新研究者来说不是很清楚。本文从技术角度和法律角度对网络取证行为进行了系统的探讨。讨论的目的是概述网络取证行为的形式化和标准化。据我们所知,这是第一次全面讨论网络取证模型及其基本领域,如分类、概念模型、法理、关键技术、规范流程及其附属设施和系统——网络取证系统架构和部署。这些讨论将为网络取证流程的标准化和原型系统的实现提供指导。
{"title":"Modeling the network forensics behaviors","authors":"Wei Ren, Hai Jin","doi":"10.1109/SECCMW.2005.1588287","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588287","url":null,"abstract":"Network forensics is a new coming approach to the network security. However, this field is not very clear to the new researchers. In this paper, we discuss the network forensics behaviors systematically from both the technical view and legal view. The goal of discussion is to outline the formalization and standardization of the network forensics behaviors. To our knowledge, this is the first time to comprehensively discuss the network forensics model and its fundamental fields, such as taxonomy, conceptual model, legal principles, key techniques, canonical processes and its accessory facilities and systems - network forensics system architecture and deployment. These discussions will give the guidance to the standardization of network forensics processes and the implementation of prototype system.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116774143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A context-aware trust-based security system for ad hoc networks 用于自组织网络的上下文感知的基于信任的安全系统
Maria Moloney, S. Weber
Mobile ad-hoc networks (MANETs) comprise computer nodes which communicate over wireless links without any central control. Therefore, they must be able to make fully autonomous security decisions. This introduces new security challenges that existing security models and mechanisms do not adequately address (Campbell, 2002). In this paper we present a trust-based security system that deals with the specific challenges of MANETs by combining decentralised security management and context-aware computing. With this combination, our trust-based security system can establish appropriate trust levels for every situation.
移动自组织网络(manet)由计算机节点组成,这些节点在没有任何中央控制的情况下通过无线链路通信。因此,他们必须能够做出完全自主的安全决策。这带来了新的安全挑战,现有的安全模型和机制没有充分解决(Campbell, 2002)。在本文中,我们提出了一个基于信任的安全系统,通过结合分散的安全管理和上下文感知计算来处理manet的具体挑战。通过这种组合,我们基于信任的安全系统可以为每种情况建立适当的信任级别。
{"title":"A context-aware trust-based security system for ad hoc networks","authors":"Maria Moloney, S. Weber","doi":"10.2139/SSRN.2227592","DOIUrl":"https://doi.org/10.2139/SSRN.2227592","url":null,"abstract":"Mobile ad-hoc networks (MANETs) comprise computer nodes which communicate over wireless links without any central control. Therefore, they must be able to make fully autonomous security decisions. This introduces new security challenges that existing security models and mechanisms do not adequately address (Campbell, 2002). In this paper we present a trust-based security system that deals with the specific challenges of MANETs by combining decentralised security management and context-aware computing. With this combination, our trust-based security system can establish appropriate trust levels for every situation.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125700673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization 为安全和隐私共享计算机网络日志:匿名化新方法的动机
A. Slagell, W. Yurcik
Logs are one of the most fundamental resources to any security professional. It is widely recognized by the government and industry that it is both beneficial and desirable to share logs for the purpose of security research. However, the sharing is not happening or not to the degree or magnitude that is desired. Organizations are reluctant to share logs because of the risk from exposing sensitive information to potential attackers. In this paper we survey current attempts at sharing logs and current log anonymization tools. We further define the problem and describe a roadmap to solve the issues that have to date inhibited large scale log sharing.
日志是任何安全专业人员最基本的资源之一。政府和业界普遍认为,为安全研究目的共享日志是有益的,也是可取的。然而,这种共享并没有实现,或者说共享的程度和范围没有达到预期。由于存在向潜在攻击者暴露敏感信息的风险,各组织不愿共享日志。在本文中,我们调查了当前共享日志的尝试和当前的日志匿名化工具。我们进一步定义了问题,并描述了解决迄今为止阻碍大规模日志共享的问题的路线图。
{"title":"Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization","authors":"A. Slagell, W. Yurcik","doi":"10.1109/SECCMW.2005.1588299","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588299","url":null,"abstract":"Logs are one of the most fundamental resources to any security professional. It is widely recognized by the government and industry that it is both beneficial and desirable to share logs for the purpose of security research. However, the sharing is not happening or not to the degree or magnitude that is desired. Organizations are reluctant to share logs because of the risk from exposing sensitive information to potential attackers. In this paper we survey current attempts at sharing logs and current log anonymization tools. We further define the problem and describe a roadmap to solve the issues that have to date inhibited large scale log sharing.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"348 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126029839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 81
Trust and security in pervasive networking (pervasivetrust 2005) 普及网络中的信任和安全(pervasivetrust 2005)
S. Rao
The twenty-first century is the era of the Internet. The Internet combines techniques of traditional industry and info-communication. Trustworthiness of communication is the key of healthy information society. Trust and associated security have become the important issues of all current discussions due to a variety of reasons, including data protection, economic dependency, national security and e-commerce. Trust has to be built among users for the usage of network infrastructure by protecting and providing for the confidentiality, integrity, availability and authentication of information and communication systems, including the data and information they transfer. Today there is a huge number of security technologies available on various layers of the protocol stack. All these different kinds of security technologies, which are partly already complex by themselves, make it difficult for the ordinary user to do the correct selection and configuration for his indiviual needs as well as the security requirements of the user's current ambience. The main focus of current research activities is to improve the userfriendliness for applying security technologies and therefore paving the way to a broader deployment of security in general and build trust. The workshop on ‘Trust and Security in pervasive networking’ provides a global overview of trust and security issues in pervasive communication networks. The workshop will cover an overview of existing and emerging security technologies and will describe their functionality and provide information about the threats and vulnerabilities they are defeating, their level of maturity and their complexity. The speakers are expected to address the well known solutions towards building trustworthy networks. The session also provides the limitations of current communication security in the rising multimedia communication age and the need for more complex/subtle security mechanisms and policies. The invited speakers will provide a short description of new security paradigms with the emergence of the ambient intelligence concept (infospheres and virtual paradigms) and new architectures (P2P, Virtual entities ...) and their application to sensor networks. The new environment (“always connected”, nomadic users, mobile infrastructures, heterogeneity ...) and the pregnant morphology of information systems that require a drastic change of our static vision of legislations and rules for security policies to be enforced, implemented and verified. The workshop will address new aspects of protection and security functions required for users, in a private infosphere (virtual identity, authentication with time and space, anonymity, non-observability, digital rights management, biometry), in a networked infosphere (virtual private networks, new firewalls, inter-network security), and in an open public infosphere. The invited speaker from the European Security initiative will also explain SEINIT's approach to shield the complexit
21世纪是互联网的时代。互联网结合了传统工业技术和信息通信技术。传播诚信是健康信息社会的关键。由于各种原因,包括数据保护、经济依赖、国家安全和电子商务,信任和相关安全已经成为当前所有讨论的重要问题。必须在使用网络基础结构的用户之间建立信任,保护和提供信息和通信系统的机密性、完整性、可用性和认证,包括它们传输的数据和信息。如今,在协议栈的各个层上有大量可用的安全技术。所有这些不同种类的安全技术,部分本身就已经很复杂,使得普通用户很难根据自己的个性化需求以及用户当前环境的安全要求进行正确的选择和配置。当前研究活动的主要重点是提高应用安全技术的用户友好性,从而为更广泛地部署安全铺平道路,并建立信任。“普及网络中的信任和安全”研讨会提供了普及通信网络中的信任和安全问题的全球概述。研讨会将涵盖现有和新兴安全技术的概述,描述它们的功能,并提供有关它们正在击败的威胁和漏洞、它们的成熟度和复杂性的信息。演讲者将讨论建立可信赖网络的众所周知的解决方案。讨论了当前通信安全在日益发展的多媒体通信时代的局限性,以及对更复杂/微妙的安全机制和策略的需求。受邀演讲者将简要介绍随着环境智能概念(信息空间和虚拟范式)和新架构(P2P,虚拟实体…)的出现而出现的新安全范式及其在传感器网络中的应用。新的环境(“始终连接”、游牧用户、移动基础设施、异构性……)和信息系统的孕育形态,要求我们对安全策略的静态立法和规则的看法发生重大变化,以便执行、实施和验证。讲习班将讨论在私有信息圈(虚拟身份、时间和空间认证、匿名性、不可观察性、数字权利管理、生物识别)、网络信息圈(虚拟专用网、新型防火墙、网络间安全)和开放公共信息圈中用户所需的保护和安全功能的新方面。来自欧洲安全倡议的受邀演讲者还将解释SEINIT通过部署虚拟安全架构来屏蔽用户安全复杂性的方法。它将解释各种安全技术集成到这个SEINIT架构中,并描述建立安全关联的过程。会议将讨论新出现的漏洞,并概述旨在保护关键基础设施和降低相互攻击风险的系统安全方法
{"title":"Trust and security in pervasive networking (pervasivetrust 2005)","authors":"S. Rao","doi":"10.1109/SECCMW.2005.1588325","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588325","url":null,"abstract":"The twenty-first century is the era of the Internet. The Internet combines techniques of traditional industry and info-communication. Trustworthiness of communication is the key of healthy information society. Trust and associated security have become the important issues of all current discussions due to a variety of reasons, including data protection, economic dependency, national security and e-commerce. Trust has to be built among users for the usage of network infrastructure by protecting and providing for the confidentiality, integrity, availability and authentication of information and communication systems, including the data and information they transfer. Today there is a huge number of security technologies available on various layers of the protocol stack. All these different kinds of security technologies, which are partly already complex by themselves, make it difficult for the ordinary user to do the correct selection and configuration for his indiviual needs as well as the security requirements of the user's current ambience. The main focus of current research activities is to improve the userfriendliness for applying security technologies and therefore paving the way to a broader deployment of security in general and build trust. The workshop on ‘Trust and Security in pervasive networking’ provides a global overview of trust and security issues in pervasive communication networks. The workshop will cover an overview of existing and emerging security technologies and will describe their functionality and provide information about the threats and vulnerabilities they are defeating, their level of maturity and their complexity. The speakers are expected to address the well known solutions towards building trustworthy networks. The session also provides the limitations of current communication security in the rising multimedia communication age and the need for more complex/subtle security mechanisms and policies. The invited speakers will provide a short description of new security paradigms with the emergence of the ambient intelligence concept (infospheres and virtual paradigms) and new architectures (P2P, Virtual entities ...) and their application to sensor networks. The new environment (“always connected”, nomadic users, mobile infrastructures, heterogeneity ...) and the pregnant morphology of information systems that require a drastic change of our static vision of legislations and rules for security policies to be enforced, implemented and verified. The workshop will address new aspects of protection and security functions required for users, in a private infosphere (virtual identity, authentication with time and space, anonymity, non-observability, digital rights management, biometry), in a networked infosphere (virtual private networks, new firewalls, inter-network security), and in an open public infosphere. The invited speaker from the European Security initiative will also explain SEINIT's approach to shield the complexit","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133947390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer network forensics research workshop 2005 "defining network forensics" 计算机网络取证研究研讨会2005“定义网络取证”
Understanding malicious behavior on networks is becoming a critical research problem. In response to this, funding agencies such as the United States National Science Foundation have begun making funding in this area a priority. As often happens in a new research field, it is difficult to get a clear picture of what has been done and what topics fall within its purview. The goal of this workshop for 2005 is to define network forensics as a discipline and how relates to existing work in forensics and network security. It is my distinct pleasure to present these proceedings. This year, we accepted six papers and one extended abstract. The scholarship described in this work spans bodies of work from taxonomy to systems engineering to case studies of investigations. Although not a part of the formal proceedings, working sessions during the workshop will focus on definitional issues. Outcomes from these working sessions will be posted on the workshop web site. As this field continues to grow, I hope that this workshop can continue to grow and mature as a venue for the discussion and presentation of network forensics research.
理解网络上的恶意行为正成为一个关键的研究问题。为此,诸如美国国家科学基金会这样的资助机构已经开始将这一领域的资助作为优先事项。正如在一个新的研究领域经常发生的那样,很难清楚地了解已经做了什么,以及哪些主题属于其研究范围。2005年研讨会的目标是将网络取证定义为一门学科,以及如何将取证和网络安全中的现有工作联系起来。我非常荣幸地介绍这些会议。今年,我们接受了六篇论文和一篇扩展摘要。在这项工作中描述的奖学金涵盖了从分类学到系统工程到调查案例研究的工作机构。虽然不是正式会议的一部分,但讲习班期间的工作会议将侧重于定义问题。这些工作会议的成果将公布在讲习班的网站上。随着这个领域的不断发展,我希望这个研讨会能够继续发展和成熟,成为一个讨论和展示网络取证研究的场所。
{"title":"Computer network forensics research workshop 2005 \"defining network forensics\"","authors":"","doi":"10.1109/seccmw.2005.1588286","DOIUrl":"https://doi.org/10.1109/seccmw.2005.1588286","url":null,"abstract":"Understanding malicious behavior on networks is becoming a critical research problem. In response to this, funding agencies such as the United States National Science Foundation have begun making funding in this area a priority. As often happens in a new research field, it is difficult to get a clear picture of what has been done and what topics fall within its purview. The goal of this workshop for 2005 is to define network forensics as a discipline and how relates to existing work in forensics and network security. It is my distinct pleasure to present these proceedings. This year, we accepted six papers and one extended abstract. The scholarship described in this work spans bodies of work from taxonomy to systems engineering to case studies of investigations. Although not a part of the formal proceedings, working sessions during the workshop will focus on definitional issues. Outcomes from these working sessions will be posted on the workshop web site. As this field continues to grow, I hope that this workshop can continue to grow and mature as a venue for the discussion and presentation of network forensics research.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130419669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FIrDA-SSL: experiments with securing communication in PANs FIrDA-SSL:在pan中保护通信的实验
D. Berbecaru
In personal area networks (PANs), a personal operating space (POS) surrounds the person up to 10 meters in all directions and it contains several types of wireless devices exchanging data between them (intra-PAN communication), or with devices from another POS or as part of broader networks (inter-PAN communication). Security is seen as a "big issue" both for intra and inter-PAN communication. The security mechanisms or protocols involved should also run on user devices within a reasonable amount of time. Clearly one of the first issues to be addressed in PANs is to transfer information securely and we provide a practical approach for this issue. In practice, we want to enable the exchange of "personal" data only to authenticated parties and doing this with standard protocols, client software or commercial products available at the moment. We developed a tool named FIrDA-SSL (Footprint Irda SSL transfer) for secure transfer of small amounts of data, like a credit card number, or a personal identification information, between devices with infrared ports. FIrDA-SSL's performance running on a Windows CE-enabled handheld PC and having a StrongARM processor at 206 MHz (i.e. HP Jornada 720) was compared with the one obtained when running FIrDA-SSL on 'powerful' Windows 2000fKP-enabled laptops. FIrDA-SSL connection latency was also confronted with the experiments run in other related work, e.g. on a Palm Pilot platform.
在个人局域网(pan)中,个人操作空间(POS)在所有方向上围绕着人长达10米,它包含几种无线设备在它们之间交换数据(pan内通信),或与来自另一个POS的设备或作为更广泛网络的一部分(pan间通信)。对于pan内部和pan之间的通信,安全性都被视为一个“大问题”。所涉及的安全机制或协议也应该在合理的时间内运行在用户设备上。显然,在pan中首先要解决的问题之一是安全传输信息,我们为此提供了一种实用的方法。在实践中,我们希望只向经过身份验证的各方交换“个人”数据,并使用标准协议、客户端软件或目前可用的商业产品来实现这一点。我们开发了一个名为FIrDA-SSL (Footprint Irda SSL transfer)的工具,用于在带有红外端口的设备之间安全传输少量数据,如信用卡号码或个人身份信息。FIrDA-SSL在支持Windows ce的手持PC上运行的性能,具有206mhz的StrongARM处理器(即HP Jornada 720),与在“强大的”支持Windows 2000fkp的笔记本电脑上运行FIrDA-SSL时获得的性能进行了比较。FIrDA-SSL连接延迟也面临着其他相关工作的实验,例如在Palm Pilot平台上。
{"title":"FIrDA-SSL: experiments with securing communication in PANs","authors":"D. Berbecaru","doi":"10.1109/SECCMW.2005.1588324","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588324","url":null,"abstract":"In personal area networks (PANs), a personal operating space (POS) surrounds the person up to 10 meters in all directions and it contains several types of wireless devices exchanging data between them (intra-PAN communication), or with devices from another POS or as part of broader networks (inter-PAN communication). Security is seen as a \"big issue\" both for intra and inter-PAN communication. The security mechanisms or protocols involved should also run on user devices within a reasonable amount of time. Clearly one of the first issues to be addressed in PANs is to transfer information securely and we provide a practical approach for this issue. In practice, we want to enable the exchange of \"personal\" data only to authenticated parties and doing this with standard protocols, client software or commercial products available at the moment. We developed a tool named FIrDA-SSL (Footprint Irda SSL transfer) for secure transfer of small amounts of data, like a credit card number, or a personal identification information, between devices with infrared ports. FIrDA-SSL's performance running on a Windows CE-enabled handheld PC and having a StrongARM processor at 206 MHz (i.e. HP Jornada 720) was compared with the one obtained when running FIrDA-SSL on 'powerful' Windows 2000fKP-enabled laptops. FIrDA-SSL connection latency was also confronted with the experiments run in other related work, e.g. on a Palm Pilot platform.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116723526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1