首页 > 最新文献

2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)最新文献

英文 中文
Reducing Complexity of Diagnostic Message Pattern Specification and Recognition on In-Bound Data Using Semantic Techniques 利用语义技术降低诊断消息模式规范和入站数据识别的复杂性
Gilbert Alipui, Lixin Tao, Keke Gai, Ning Jiang
Different companies in the same line of business can have similar computer systems with built-in diagnostic routines, and the ability to regularly send error-driven or event-driven environmental diagnostic messages in XML back to the system manufacturer. The system manufacturer typically uses these to determine faults in the system. The outcome of this troubleshooting can also assist end-users and clients in solving problems, and provide the production team valuable information that can be used to improve future versions of the product. A Company merger could lead to the same team processing diagnostic messages from similar but different products, in different syntax, leading to complexity explosion of specifying and maintaining diagnostic message pattern specification and recognition for many different syntaxes. This research reduces the above complexity by extending ISO Schematron, the industry standard language for XML semantic constraints specification and validation, with conceptual rules. Pace University Knowledge Graphs are used to describe the concepts or classes relevant to the diagnostic messages of a system, and the new conceptual Schematron rules are introduced to specify diagnostic patterns on these concepts. Such conceptual diagnostic patterns are then converted automatically into concrete Schematron rules based on the syntax of the specific diagnostic messages. A complete prototype was designed and implemented to validate this new methodology.
同一业务领域的不同公司可以拥有内置诊断例程的类似计算机系统,并且能够定期以XML格式将错误驱动或事件驱动的环境诊断消息发送回系统制造商。系统制造商通常使用这些来确定系统中的故障。这种故障排除的结果还可以帮助最终用户和客户解决问题,并为生产团队提供有价值的信息,这些信息可用于改进产品的未来版本。公司合并可能导致相同的团队以不同的语法处理来自相似但不同的产品的诊断消息,从而导致指定和维护诊断消息模式规范和识别许多不同语法的复杂性激增。本研究通过用概念规则扩展ISO Schematron(用于XML语义约束规范和验证的行业标准语言)来降低上述复杂性。Pace University知识图用于描述与系统诊断消息相关的概念或类,并引入了新的概念性Schematron规则来指定这些概念上的诊断模式。然后,这些概念诊断模式会根据特定诊断消息的语法自动转换为具体的Schematron规则。设计并实现了一个完整的原型来验证这种新方法。
{"title":"Reducing Complexity of Diagnostic Message Pattern Specification and Recognition on In-Bound Data Using Semantic Techniques","authors":"Gilbert Alipui, Lixin Tao, Keke Gai, Ning Jiang","doi":"10.1109/CSCloud.2016.33","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.33","url":null,"abstract":"Different companies in the same line of business can have similar computer systems with built-in diagnostic routines, and the ability to regularly send error-driven or event-driven environmental diagnostic messages in XML back to the system manufacturer. The system manufacturer typically uses these to determine faults in the system. The outcome of this troubleshooting can also assist end-users and clients in solving problems, and provide the production team valuable information that can be used to improve future versions of the product. A Company merger could lead to the same team processing diagnostic messages from similar but different products, in different syntax, leading to complexity explosion of specifying and maintaining diagnostic message pattern specification and recognition for many different syntaxes. This research reduces the above complexity by extending ISO Schematron, the industry standard language for XML semantic constraints specification and validation, with conceptual rules. Pace University Knowledge Graphs are used to describe the concepts or classes relevant to the diagnostic messages of a system, and the new conceptual Schematron rules are introduced to specify diagnostic patterns on these concepts. Such conceptual diagnostic patterns are then converted automatically into concrete Schematron rules based on the syntax of the specific diagnostic messages. A complete prototype was designed and implemented to validate this new methodology.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132028901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage SE-ORAM:用于云存储隐私保护访问的高效存储遗忘RAM
Qiumao Ma, Jinsheng Zhang, Yang Peng, Wensheng Zhang, D. Qiao
Oblivious RAM (ORAM) is a security-provable approach for protecting clients' access patterns to remote cloud storage. Recently, numerous ORAM constructions have been proposed to improve the communication efficiency of the ORAM model, but little attention has been paid to the storage efficiency. The state-of-the-art ORAM constructions have the storage overhead of O(N) or O(N log N) blocks at the server, when N data blocks are hosted. To fill the blank, this paper proposes a storage-efficient ORAM (SE-ORAM) construction with configurable security parameter λ and zero storage overhead at the server. Extensive analysis has also been conducted and the results show that, SE-ORAM achieves the configured level of security, introduces zero storage overhead to the storage server (i.e., the storage server only storages N data blocks), and incurs O(log N) blocks storage overhead at the client, as long as λ ≥ 2 and each node on the storage tree stores 4 log N or more data blocks.
遗忘RAM (ORAM)是一种安全可验证的方法,用于保护客户端对远程云存储的访问模式。近年来,人们提出了许多ORAM结构来提高ORAM模型的通信效率,但很少关注存储效率。当托管N个数据块时,最先进的ORAM结构在服务器上的存储开销为O(N)或O(N log N)块。为了填补这一空白,本文提出了一种具有可配置安全参数λ和服务器零存储开销的存储高效ORAM (SE-ORAM)结构。我们还进行了广泛的分析,结果表明,SE-ORAM达到了配置的安全级别,给存储服务器带来了零存储开销(即存储服务器只存储N个数据块),只要λ≥2且存储树上的每个节点存储4 log N或更多的数据块,则在客户端产生O(log N)块存储开销。
{"title":"SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage","authors":"Qiumao Ma, Jinsheng Zhang, Yang Peng, Wensheng Zhang, D. Qiao","doi":"10.1109/CSCloud.2016.24","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.24","url":null,"abstract":"Oblivious RAM (ORAM) is a security-provable approach for protecting clients' access patterns to remote cloud storage. Recently, numerous ORAM constructions have been proposed to improve the communication efficiency of the ORAM model, but little attention has been paid to the storage efficiency. The state-of-the-art ORAM constructions have the storage overhead of O(N) or O(N log N) blocks at the server, when N data blocks are hosted. To fill the blank, this paper proposes a storage-efficient ORAM (SE-ORAM) construction with configurable security parameter λ and zero storage overhead at the server. Extensive analysis has also been conducted and the results show that, SE-ORAM achieves the configured level of security, introduces zero storage overhead to the storage server (i.e., the storage server only storages N data blocks), and incurs O(log N) blocks storage overhead at the client, as long as λ ≥ 2 and each node on the storage tree stores 4 log N or more data blocks.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121088289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
MongoDB NoSQL Injection Analysis and Detection MongoDB NoSQL注入分析与检测
Boyu Hou, K. Qian, Lei Li, Yong Shi, Lixin Tao, Jigang Liu
A NoSQL, also called a "Non-Relational" or "Not only SQL," database system provides an approach to data management and database design for very large sets of distributed data and real-time web applications. A NoSQL database system is also a popular data storage for information retrieval because it supports better scalability, availability, and faster data access while comparing with traditional relational database management systems (RDBMS). What the RDBMS data needs is predictable as its data is stored in structured tables by defining the relationship between the different columns. In contrary the data in NoSQL databases does not need to be stored in a structured or fixed fashion. When performance and real-time access are more concerned than consistency, such as indexing and retrieving large numbers of records, NoSQL databases are more suitable than relational databases. With their obvious advantages in better performance, scalability, and flexibility, NoSQL databases have been adopted lately by many small businesses as they are moving their increasing business data into the clouds. However, the research on the security of a specific NoSQL database system or NoSQL database systems in general is very limited. Although there are many storage advantages in NoSQL databases, the need of quick and easy access to data has been seriously affected by the security issue of NoSQL databases. This paper examines the maturity of security measures for MongoDB, a typical NoSQL database system, with aspects in both attack and defense at the code level. The experimental testing on NoSQL injections is performed with JavaScript and PHP. After the demonstration on how a server-side JavaScript injection attack against a NoSQL database system reveals the customer's private data, two methods are discussed in preventing this type of security problems from happening. It is believed that our study will help database developers not only realizing that NoSQL database systems are not designed with security as a priority but also learning how to build a security layer to their organizations' NoSQL applications to avoid NoSQL injections.
NoSQL,也被称为“非关系”或“不仅仅是SQL”,数据库系统为非常大的分布式数据集和实时web应用程序提供了一种数据管理和数据库设计方法。NoSQL数据库系统也是一种流行的信息检索数据存储,因为与传统的关系数据库管理系统(RDBMS)相比,它支持更好的可伸缩性、可用性和更快的数据访问。RDBMS数据的需求是可预测的,因为它的数据通过定义不同列之间的关系存储在结构化表中。相反,NoSQL数据库中的数据不需要以结构化或固定的方式存储。当性能和实时访问比一致性更重要时,例如索引和检索大量记录,NoSQL数据库比关系数据库更合适。由于在更好的性能、可伸缩性和灵活性方面具有明显的优势,NoSQL数据库最近被许多小型企业采用,因为它们正在将不断增长的业务数据迁移到云中。然而,对于特定NoSQL数据库系统或一般NoSQL数据库系统的安全性研究非常有限。尽管NoSQL数据库在存储方面有很多优势,但是NoSQL数据库的安全性问题严重影响了人们对数据快速方便访问的需求。本文从代码层面的攻击和防御两个方面考察了典型的NoSQL数据库系统MongoDB安全措施的成熟度。用JavaScript和PHP对NoSQL注入进行了实验测试。在演示了针对NoSQL数据库系统的服务器端JavaScript注入攻击如何暴露客户的私有数据之后,讨论了防止此类安全问题发生的两种方法。相信我们的研究将帮助数据库开发人员不仅认识到NoSQL数据库系统在设计时并没有优先考虑安全性,而且还将学习如何为其组织的NoSQL应用程序构建安全层,以避免NoSQL注入。
{"title":"MongoDB NoSQL Injection Analysis and Detection","authors":"Boyu Hou, K. Qian, Lei Li, Yong Shi, Lixin Tao, Jigang Liu","doi":"10.1109/CSCloud.2016.57","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.57","url":null,"abstract":"A NoSQL, also called a \"Non-Relational\" or \"Not only SQL,\" database system provides an approach to data management and database design for very large sets of distributed data and real-time web applications. A NoSQL database system is also a popular data storage for information retrieval because it supports better scalability, availability, and faster data access while comparing with traditional relational database management systems (RDBMS). What the RDBMS data needs is predictable as its data is stored in structured tables by defining the relationship between the different columns. In contrary the data in NoSQL databases does not need to be stored in a structured or fixed fashion. When performance and real-time access are more concerned than consistency, such as indexing and retrieving large numbers of records, NoSQL databases are more suitable than relational databases. With their obvious advantages in better performance, scalability, and flexibility, NoSQL databases have been adopted lately by many small businesses as they are moving their increasing business data into the clouds. However, the research on the security of a specific NoSQL database system or NoSQL database systems in general is very limited. Although there are many storage advantages in NoSQL databases, the need of quick and easy access to data has been seriously affected by the security issue of NoSQL databases. This paper examines the maturity of security measures for MongoDB, a typical NoSQL database system, with aspects in both attack and defense at the code level. The experimental testing on NoSQL injections is performed with JavaScript and PHP. After the demonstration on how a server-side JavaScript injection attack against a NoSQL database system reveals the customer's private data, two methods are discussed in preventing this type of security problems from happening. It is believed that our study will help database developers not only realizing that NoSQL database systems are not designed with security as a priority but also learning how to build a security layer to their organizations' NoSQL applications to avoid NoSQL injections.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130314825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A Remote Backup Approach for Virtual Machine Images 虚拟机映像的远程备份方法
Zhe Wang, Jin Zeng, Tao Lv, Bin Shi, B. Li
Recent years witness the successful application of Cloud computing. Virtualization plays a key role in cloud computing and greatly facilitates application deployment and migration. Tenants' applications are hosted by virtual machines. The security and safety of user applications receive much attention from academia and industry. However, fault tolerance and availability issues of cloud applications are overlooked. In this paper, we focus on the high availability issue of virtual machines. We propose a remote backup approach, named LiveRB, for saving the running states of virtual machines in an online manner. The backup process operates in background and is transparent to the applications hosted in virtual machines. Live migration technique is used to save the running states of virtual machines. A virtual block device is designed to cache I/O operations in memory and save incremental virtual disk data of the virtual machine to a remote server. We implement LiveRB on KVM virtualization platform. We evaluate the effectiveness and efficiency of LiveRB through comprehensive experiments. The results show that LiveRB can lively backup a virtual machine to a remote server with only slight performance penalty.
近年来,云计算的应用取得了成功。虚拟化在云计算中起着关键作用,极大地促进了应用程序的部署和迁移。租户的应用程序由虚拟机托管。用户应用程序的安全性受到学术界和工业界的广泛关注。然而,云应用程序的容错和可用性问题却被忽视了。在本文中,我们主要关注虚拟机的高可用性问题。我们提出了一种名为LiveRB的远程备份方法,以在线方式保存虚拟机的运行状态。备份过程在后台运行,对托管在虚拟机中的应用程序是透明的。动态迁移技术用于保存虚拟机的运行状态。虚拟块设备用于在内存中缓存I/O操作,并将虚拟机的增量虚拟磁盘数据保存到远程服务器。我们在KVM虚拟化平台上实现LiveRB。我们通过综合实验来评估LiveRB的有效性和效率。结果表明,LiveRB可以将虚拟机实时备份到远程服务器,而性能损失很小。
{"title":"A Remote Backup Approach for Virtual Machine Images","authors":"Zhe Wang, Jin Zeng, Tao Lv, Bin Shi, B. Li","doi":"10.1109/CSCloud.2016.41","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.41","url":null,"abstract":"Recent years witness the successful application of Cloud computing. Virtualization plays a key role in cloud computing and greatly facilitates application deployment and migration. Tenants' applications are hosted by virtual machines. The security and safety of user applications receive much attention from academia and industry. However, fault tolerance and availability issues of cloud applications are overlooked. In this paper, we focus on the high availability issue of virtual machines. We propose a remote backup approach, named LiveRB, for saving the running states of virtual machines in an online manner. The backup process operates in background and is transparent to the applications hosted in virtual machines. Live migration technique is used to save the running states of virtual machines. A virtual block device is designed to cache I/O operations in memory and save incremental virtual disk data of the virtual machine to a remote server. We implement LiveRB on KVM virtualization platform. We evaluate the effectiveness and efficiency of LiveRB through comprehensive experiments. The results show that LiveRB can lively backup a virtual machine to a remote server with only slight performance penalty.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123498652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Framework Research of Power Grid Knowledge Recommendation and Situation Reasoning Based on Cloud Computing and CEP 基于云计算和CEP的电网知识推荐与情境推理框架研究
Jian Su, Yu Huang, Guangxian Lv, Haitao Liu, Peng Jin
Modern power grid can produce a large amount of data at run time which shows a feature of fragmentation and disordering. Using the method of cloud-based knowledge management to achieve grid data, information retrieval, situation deducing and disaster warning, are important thoughts to be implemented. To solve the challenge, we put forward a software framework including knowledge recommendation and situation inference based on cloud computing and CEP(Complex Event Process). The framework can realize Large-scale analysis and intelligent recommendation for power grid and build reduction rules and models of power grid accident to implement disaster warning through CEP. Also, we show the prototype system.
现代电网在运行时产生的大量数据呈现出碎片化、无序化的特点。利用基于云的知识管理方法实现网格化数据、信息检索、态势演绎和灾害预警,是需要实现的重要思路。为了解决这一挑战,我们提出了一种基于云计算和CEP(Complex Event Process)的知识推荐和情境推理软件框架。该框架可以实现对电网的大规模分析和智能推荐,建立电网事故减少规则和模型,通过CEP实现灾害预警。同时,我们展示了原型系统。
{"title":"A Framework Research of Power Grid Knowledge Recommendation and Situation Reasoning Based on Cloud Computing and CEP","authors":"Jian Su, Yu Huang, Guangxian Lv, Haitao Liu, Peng Jin","doi":"10.1109/CSCloud.2016.14","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.14","url":null,"abstract":"Modern power grid can produce a large amount of data at run time which shows a feature of fragmentation and disordering. Using the method of cloud-based knowledge management to achieve grid data, information retrieval, situation deducing and disaster warning, are important thoughts to be implemented. To solve the challenge, we put forward a software framework including knowledge recommendation and situation inference based on cloud computing and CEP(Complex Event Process). The framework can realize Large-scale analysis and intelligent recommendation for power grid and build reduction rules and models of power grid accident to implement disaster warning through CEP. Also, we show the prototype system.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121444972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On-demand Pseudonym Systems in Geo-Distributed Mobile Cloud Computing 地理分布式移动云计算中的按需假名系统
Jiawen Kang, Rong Yu, Xumin Huang, Sabita Maharjan, Yan Zhang
Geo-distributed mobile cloud computing (GMCC) integrates location information into mobile cloud computing, that has high potential for a large variety of applications. In a vehicular environment, a GMCC provides a large number of resources to vehicles that are geographically close to them. However, there are few studies that focus on security and privacy issues in a GMCC scenario. Vehicles need sufficient pseudonyms to periodically change for privacy preservation. In this paper, we focus on pseudonym management in GMCC system for vehicular environment. We design a three-layer on-demand pseudonym system to manage the pseudonyms. Moreover, we propose a secure pseudonym distribution scheme for secure communication among vehicles. As the number of demanded pseudonyms varies with traffic loads in different clouds, we use a newsvendor model to address the optimal on-demand pseudonym distribution problem. Numerical results indicate our proposed schemes not only improve utility of the clouds, but also maximize utilization of the pseudonyms.
地理分布式移动云计算(GMCC)将位置信息集成到移动云计算中,具有很大的应用潜力。在车辆环境中,GMCC为地理上靠近它们的车辆提供大量资源。然而,很少有研究关注GMCC场景中的安全和隐私问题。车辆需要足够的假名来定期更改以保护隐私。本文主要研究了车载环境GMCC系统中的假名管理。我们设计了一个三层的按需假名系统来管理假名。此外,我们还提出了一种安全的假名分发方案,用于车辆之间的安全通信。由于不同云中所需假名的数量随流量负载而变化,我们使用报摊模型来解决最佳按需假名分发问题。数值结果表明,我们提出的方案不仅提高了云的利用率,而且最大限度地提高了假名的利用率。
{"title":"On-demand Pseudonym Systems in Geo-Distributed Mobile Cloud Computing","authors":"Jiawen Kang, Rong Yu, Xumin Huang, Sabita Maharjan, Yan Zhang","doi":"10.1109/CSCloud.2016.31","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.31","url":null,"abstract":"Geo-distributed mobile cloud computing (GMCC) integrates location information into mobile cloud computing, that has high potential for a large variety of applications. In a vehicular environment, a GMCC provides a large number of resources to vehicles that are geographically close to them. However, there are few studies that focus on security and privacy issues in a GMCC scenario. Vehicles need sufficient pseudonyms to periodically change for privacy preservation. In this paper, we focus on pseudonym management in GMCC system for vehicular environment. We design a three-layer on-demand pseudonym system to manage the pseudonyms. Moreover, we propose a secure pseudonym distribution scheme for secure communication among vehicles. As the number of demanded pseudonyms varies with traffic loads in different clouds, we use a newsvendor model to address the optimal on-demand pseudonym distribution problem. Numerical results indicate our proposed schemes not only improve utility of the clouds, but also maximize utilization of the pseudonyms.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126201009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review of Intrusion Detection in 802.15.4-Based Wireless Sensor Networks 基于802.15.4的无线传感器网络入侵检测技术综述
M. Khanafer, Youssef Gahi, M. Guennoun, H. Mouftah
The widespread deployment of wireless sensor networks (WSNs) in diverse types of applications motivated the development of strong security measures to protect these networks. The main challenge against deploying strong security algorithms is that WSNs suffer from major constraints in terms of power and computing resources. WSNs impose a primary condition on the design stage that requires any protocol or algorithm to be power-efficient. This means that strong cryptography techniques cannot be used and we need another layer of defence to protect the WSN. This makes intrusion detection systems (IDSs) an essential option in these networks. IDSs can capture malicious misbehaviour that manages to penetrate the first layer of defence (i.e., cryptography and authentication). In this paper we highlight the challenges encountered while designing an efficient intrusion detection framework in WSNs, and provide a review of important contributions in this area. Finally, we propose a new approach that aids in detecting and confining intrusive behaviour in the network.
无线传感器网络(wsn)在各种类型应用中的广泛部署促使开发强大的安全措施来保护这些网络。部署强安全算法的主要挑战是无线传感器网络在功率和计算资源方面受到主要限制。无线传感器网络在设计阶段强加了一个基本条件,要求任何协议或算法都是节能的。这意味着不能使用强加密技术,我们需要另一层防御来保护WSN。这使得入侵检测系统(ids)成为这些网络中必不可少的选项。入侵防御系统可以捕获设法穿透第一层防御(即加密和身份验证)的恶意不当行为。本文重点介绍了在无线传感器网络中设计高效入侵检测框架所面临的挑战,并对该领域的重要贡献进行了综述。最后,我们提出了一种新的方法,有助于检测和限制网络中的侵入行为。
{"title":"A Review of Intrusion Detection in 802.15.4-Based Wireless Sensor Networks","authors":"M. Khanafer, Youssef Gahi, M. Guennoun, H. Mouftah","doi":"10.1109/CSCloud.2016.32","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.32","url":null,"abstract":"The widespread deployment of wireless sensor networks (WSNs) in diverse types of applications motivated the development of strong security measures to protect these networks. The main challenge against deploying strong security algorithms is that WSNs suffer from major constraints in terms of power and computing resources. WSNs impose a primary condition on the design stage that requires any protocol or algorithm to be power-efficient. This means that strong cryptography techniques cannot be used and we need another layer of defence to protect the WSN. This makes intrusion detection systems (IDSs) an essential option in these networks. IDSs can capture malicious misbehaviour that manages to penetrate the first layer of defence (i.e., cryptography and authentication). In this paper we highlight the challenges encountered while designing an efficient intrusion detection framework in WSNs, and provide a review of important contributions in this area. Finally, we propose a new approach that aids in detecting and confining intrusive behaviour in the network.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128988765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Toward a Big Data Architecture for Security Events Analytic 面向安全事件分析的大数据架构
L. Fetjah, Karim Benzidane, Hassan El Alloussi, Othman El Warrak, Said Jai-Andaloussi, A. Sekkaki
Cloud Computing did come up with so many attractive advantages such as scalability, flexibility, accessibility, rapid application deployment, and user self service. However in hindsight, Cloud Computing makes ensuring security within these environments so much challenging. Therefore traditional security mechanisms such as firewalls and antivirus softwares have proven insufficient and incapable of dealing with the sheer amount of data and events generated within a Cloud infrastructure. Herein, we present a highly scalable module based system that relies upon Big Data techniques and tools providing a comprehensive solution to process and analyze relevant events (packets flow, logs files) in order to generate an informative decisions that will be handled accordingly and swiftly.
云计算确实带来了许多吸引人的优势,如可伸缩性、灵活性、可访问性、快速应用程序部署和用户自助服务。然而,事后看来,云计算使确保这些环境中的安全性变得非常具有挑战性。因此,传统的安全机制(如防火墙和防病毒软件)已被证明不足以处理云基础设施中生成的大量数据和事件。在此,我们提出了一个高度可扩展的基于模块的系统,该系统依赖于大数据技术和工具,提供了一个全面的解决方案来处理和分析相关事件(数据包流,日志文件),以便生成一个信息丰富的决策,并将相应地迅速处理。
{"title":"Toward a Big Data Architecture for Security Events Analytic","authors":"L. Fetjah, Karim Benzidane, Hassan El Alloussi, Othman El Warrak, Said Jai-Andaloussi, A. Sekkaki","doi":"10.1109/CSCloud.2016.53","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.53","url":null,"abstract":"Cloud Computing did come up with so many attractive advantages such as scalability, flexibility, accessibility, rapid application deployment, and user self service. However in hindsight, Cloud Computing makes ensuring security within these environments so much challenging. Therefore traditional security mechanisms such as firewalls and antivirus softwares have proven insufficient and incapable of dealing with the sheer amount of data and events generated within a Cloud infrastructure. Herein, we present a highly scalable module based system that relies upon Big Data techniques and tools providing a comprehensive solution to process and analyze relevant events (packets flow, logs files) in order to generate an informative decisions that will be handled accordingly and swiftly.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130859522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Empirical Study of Using Big Data for Business Process Improvement at Private Manufacturing Firm in Cloud Computing 云计算下民营制造企业大数据业务流程改进的实证研究
Ziqi Wang, Haihui Zhao
The implementations of new technologies have been broadly accepted by multiple industries in recent years, such as big data nad cloud computing. A quick and efficient data mining has become an alternative of creating values ever, the dynamic economic context and continuous changing business envoronment have driven numerous demands and applications in various industries. This phenomenon results in the problem of forming proper strategies in applying big data and cloud computing, which is one of the major challenges of reach the goal of value creations for current enterprises. This paper focuses on this problem and presents an empirical study on the issue of using big data for business process improvements in cloud computing. The investigation target is a Chinese large-size private enterprise that strives to be a global enterpriise in the manufacturing industry. The completed research is based on the real data collected from the collaboration partner. The main findings of this research include two parts:1) the efforts of using big data are varied, which are relatedto the operation levels,2) implementating cloud computing solutions is at an exploring stage for Chinese provate sector due to a few restrictions.
近年来,新技术的实施已经被多个行业广泛接受,例如大数据和云计算。快速高效的数据挖掘已经成为创造价值的一种替代方式,动态的经济环境和不断变化的商业环境推动了各行各业的大量需求和应用。这种现象导致了大数据和云计算应用策略的形成问题,这是当前企业实现价值创造目标的主要挑战之一。本文针对这一问题,对云计算中利用大数据改进业务流程的问题进行了实证研究。调查对象是一家致力于成为制造业全球企业的中国大型民营企业。完成的研究是基于从合作伙伴那里收集的真实数据。本研究的主要发现包括两部分:1)使用大数据的力度各不相同,这与运营水平有关;2)由于一些限制,中国私营部门实施云计算解决方案处于探索阶段。
{"title":"Empirical Study of Using Big Data for Business Process Improvement at Private Manufacturing Firm in Cloud Computing","authors":"Ziqi Wang, Haihui Zhao","doi":"10.1109/CSCloud.2016.11","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.11","url":null,"abstract":"The implementations of new technologies have been broadly accepted by multiple industries in recent years, such as big data nad cloud computing. A quick and efficient data mining has become an alternative of creating values ever, the dynamic economic context and continuous changing business envoronment have driven numerous demands and applications in various industries. This phenomenon results in the problem of forming proper strategies in applying big data and cloud computing, which is one of the major challenges of reach the goal of value creations for current enterprises. This paper focuses on this problem and presents an empirical study on the issue of using big data for business process improvements in cloud computing. The investigation target is a Chinese large-size private enterprise that strives to be a global enterpriise in the manufacturing industry. The completed research is based on the real data collected from the collaboration partner. The main findings of this research include two parts:1) the efforts of using big data are varied, which are relatedto the operation levels,2) implementating cloud computing solutions is at an exploring stage for Chinese provate sector due to a few restrictions.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126726449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Analysis of Server-Side Design for Seed-Based Mobile Authentication 基于种子的移动认证服务器端设计分析
Longbin Chen, Li-Chiou Chen, N. Nassar, Meikang Qiu
With the growing popularity of mobile apps, the security issues of mobile apps become critical. Similar to traditional cyber security, mobile security includes authentication, data integrity, and data privacy. Seed-based authentication is a novel approach for mobile systems. The key idea is to extract seeds from files such as images and generate random numbers for authentication. However, in seed-based authentication, the server side design is different from traditional username-password paradigm. Few work has been done to address server-side issues on seed-based authentication. In this paper, we focus on analyzing server-side design of seed-based authentication. We develop a prototype system and set up experiments to evaluate our server-side design.
随着移动应用程序的日益普及,移动应用程序的安全问题变得至关重要。与传统的网络安全类似,移动安全包括身份验证、数据完整性和数据隐私。基于种子的身份验证是一种适用于移动系统的新方法。其关键思想是从文件(如图像)中提取种子,并生成用于身份验证的随机数。然而,在基于种子的身份验证中,服务器端设计与传统的用户名-密码范式不同。解决基于种子的身份验证的服务器端问题的工作很少。本文重点分析了基于种子的认证的服务器端设计。我们开发了一个原型系统,并建立了实验来评估我们的服务器端设计。
{"title":"An Analysis of Server-Side Design for Seed-Based Mobile Authentication","authors":"Longbin Chen, Li-Chiou Chen, N. Nassar, Meikang Qiu","doi":"10.1109/CSCloud.2016.58","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.58","url":null,"abstract":"With the growing popularity of mobile apps, the security issues of mobile apps become critical. Similar to traditional cyber security, mobile security includes authentication, data integrity, and data privacy. Seed-based authentication is a novel approach for mobile systems. The key idea is to extract seeds from files such as images and generate random numbers for authentication. However, in seed-based authentication, the server side design is different from traditional username-password paradigm. Few work has been done to address server-side issues on seed-based authentication. In this paper, we focus on analyzing server-side design of seed-based authentication. We develop a prototype system and set up experiments to evaluate our server-side design.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121516100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1