首页 > 最新文献

2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)最新文献

英文 中文
Tomographic Measuring Sensors System for Analysis and Visualization of Technological Processes 用于工艺过程分析和可视化的层析测量传感器系统
Mariusz Mazurek, T. Rymarczyk, G. Kłosowski, Michał Maj, P. Adamkiewicz
The paper presents the results of research on the use of tomographic sensors to analyze industrial processes using dedicated measuring devices, image reconstruction algorithms and cyber-physical system (CPS). The work mainly focuses on ultrasound tomography and image reconstruction using determi-nistic methods and machine learning. The tests were carried out for synthetic data and laboratory measurements. The main advantage of the proposed system is the ability to analyze spatial data and their high processing speed. The presented research results indicate that ultrasonic process tomography gives the opportunity to analyze processes occurring inside the facility without disrupting production. The presented method enables the analysis and detection of obstacles, defects and various anomalies. Knowing the characteristics of the problem, the application allows you to choose the right method of image reconstruction.
本文介绍了使用层析传感器分析工业过程的研究结果,使用专用测量设备,图像重建算法和网络物理系统(CPS)。工作主要集中在超声断层扫描和使用确定性方法和机器学习的图像重建。这些试验是为合成数据和实验室测量而进行的。该系统的主要优点是分析空间数据的能力和处理速度快。所提出的研究结果表明,超声波过程层析成像提供了在不中断生产的情况下分析设施内发生的过程的机会。所提出的方法能够对障碍物、缺陷和各种异常进行分析和检测。了解问题的特点,应用程序允许您选择正确的图像重建方法。
{"title":"Tomographic Measuring Sensors System for Analysis and Visualization of Technological Processes","authors":"Mariusz Mazurek, T. Rymarczyk, G. Kłosowski, Michał Maj, P. Adamkiewicz","doi":"10.1109/dsn-s50200.2020.00025","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00025","url":null,"abstract":"The paper presents the results of research on the use of tomographic sensors to analyze industrial processes using dedicated measuring devices, image reconstruction algorithms and cyber-physical system (CPS). The work mainly focuses on ultrasound tomography and image reconstruction using determi-nistic methods and machine learning. The tests were carried out for synthetic data and laboratory measurements. The main advantage of the proposed system is the ability to analyze spatial data and their high processing speed. The presented research results indicate that ultrasonic process tomography gives the opportunity to analyze processes occurring inside the facility without disrupting production. The presented method enables the analysis and detection of obstacles, defects and various anomalies. Knowing the characteristics of the problem, the application allows you to choose the right method of image reconstruction.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128545853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Depending on HTTP/2 for Privacy? Good Luck! 依赖于HTTP/2的隐私?好运!
Gargi Mitra
The new multi-threaded server operation feature in HTTP/2 results in multiplexed object transmission. This obfuscates the sizes of the encrypted objects, based on which passive network eavesdroppers inferred sensitive information. Therefore, recent works speculate that HTTP/2 can have an unanticipated positive effect on communication privacy in addition to the privacy provided by TLS/SSL. Orthogonal to these works, we show that it is possible for an on-path passive eavesdropper to completely break the privacy offered by the schemes that leverage HTTP/2 multiplexing. Our adversary works based on the following intuition: restricting only one HTTP/2 object to be in the server queue at any point of time will eliminate multiplexing of that object and any privacy benefit thereof. Our adversary achieves this by altering network parameters such as jitter, bandwidth and packet drop rate to ensure that no new client request reaches the server while it is serving a previously requested object. Our adversary was able to break the privacy of a real-world HTTP/2 website 90% of the time. To the best of our knowledge, this is the first privacy attack on HTTP/2.
HTTP/2中新的多线程服务器操作特性导致了多路对象传输。这混淆了加密对象的大小,被动网络窃听者据此推断出敏感信息。因此,最近的研究推测,除了TLS/SSL提供的隐私之外,HTTP/2还可以对通信隐私产生意想不到的积极影响。与这些工作正交,我们表明,路径上的被动窃听者有可能完全破坏利用HTTP/2多路复用的方案提供的隐私。我们的对手基于以下直觉工作:在任何时间点只限制一个HTTP/2对象在服务器队列中,将消除该对象的多路复用及其任何隐私好处。我们的对手通过改变网络参数(如抖动、带宽和丢包率)来实现这一点,以确保当服务器正在服务先前请求的对象时,没有新的客户端请求到达服务器。我们的对手能够在90%的时间里破坏真实世界HTTP/2网站的隐私。据我们所知,这是第一次针对HTTP/2的隐私攻击。
{"title":"Depending on HTTP/2 for Privacy? Good Luck!","authors":"Gargi Mitra","doi":"10.1109/dsn-s50200.2020.00036","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00036","url":null,"abstract":"The new multi-threaded server operation feature in HTTP/2 results in multiplexed object transmission. This obfuscates the sizes of the encrypted objects, based on which passive network eavesdroppers inferred sensitive information. Therefore, recent works speculate that HTTP/2 can have an unanticipated positive effect on communication privacy in addition to the privacy provided by TLS/SSL. Orthogonal to these works, we show that it is possible for an on-path passive eavesdropper to completely break the privacy offered by the schemes that leverage HTTP/2 multiplexing. Our adversary works based on the following intuition: restricting only one HTTP/2 object to be in the server queue at any point of time will eliminate multiplexing of that object and any privacy benefit thereof. Our adversary achieves this by altering network parameters such as jitter, bandwidth and packet drop rate to ensure that no new client request reaches the server while it is serving a previously requested object. Our adversary was able to break the privacy of a real-world HTTP/2 website 90% of the time. To the best of our knowledge, this is the first privacy attack on HTTP/2.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127513691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from the Fast Abstracts and Posters Chairs 来自快速摘要和海报椅子的信息
J. López, Jianwen Xiang, Kenichi Kourai, Regina Moraes, X. Défago, Dong Seong Kim, Kok Onn Chee, Mengmeng Ge
A DSN Fast Abstract paper is a lightly reviewed, two-page technical article on new ideas, work in progress, or opinions relevant to dependable and secure systems and networks. Contributions are particularly solicited from project teams, industrial practitioners, and academics who may not have been able to prepare and see full papers accepted for DSN, but nevertheless seek an opportunity to engage with, or get feedback from, the DSN community. Fast Abstract papers enable their authors to:
DSN快速摘要论文是一篇两页的技术文章,内容涉及与可靠和安全的系统和网络相关的新想法、正在进行的工作或意见。特别向项目团队、行业从业者和学者征求意见,他们可能无法准备和看到DSN接受的完整论文,但仍然寻求与DSN社区接触或获得反馈的机会。快速摘要论文使其作者能够:
{"title":"Message from the Fast Abstracts and Posters Chairs","authors":"J. López, Jianwen Xiang, Kenichi Kourai, Regina Moraes, X. Défago, Dong Seong Kim, Kok Onn Chee, Mengmeng Ge","doi":"10.1109/dsn-s50200.2020.00007","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00007","url":null,"abstract":"A DSN Fast Abstract paper is a lightly reviewed, two-page technical article on new ideas, work in progress, or opinions relevant to dependable and secure systems and networks. Contributions are particularly solicited from project teams, industrial practitioners, and academics who may not have been able to prepare and see full papers accepted for DSN, but nevertheless seek an opportunity to engage with, or get feedback from, the DSN community. Fast Abstract papers enable their authors to:","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128206587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pitfalls of Provably Secure Systems in Internet the Case of Chronos-NTP Internet中可证明安全系统的缺陷——以Chronos-NTP为例
Philipp Jeitner, Haya Shulman, M. Waidner
The critical role that Network Time Protocol (NTP) plays in the Internet led to multiple efforts to secure it against time-shifting attacks. A recent proposal for enhancing the security of NTP with Chronos against on-path attackers seems the most promising one and is on a standardisation track of the IETF. In this work we demonstrate off-path attacks against Chronos enhanced NTP clients. The weak link is a central security feature of Chronos: The server pool generation mechanism using DNS. We show that the insecurity of DNS allows to subvert the security of Chronos making the time-shifting attacks against Chronos-NTP even easier than attacks against plain NTP.
网络时间协议(NTP)在Internet中所起的关键作用导致多方努力来保护它免受时移攻击。最近一项利用Chronos增强NTP的安全性以抵御路径上攻击者的建议似乎是最有希望的,并且正在IETF的标准化轨道上。在这项工作中,我们演示了针对Chronos增强型NTP客户端的偏离路径攻击。弱链接是Chronos的核心安全特性:使用DNS的服务器池生成机制。我们表明,DNS的不安全性允许破坏Chronos的安全性,使得针对Chronos-NTP的时移攻击比针对普通NTP的攻击更容易。
{"title":"Pitfalls of Provably Secure Systems in Internet the Case of Chronos-NTP","authors":"Philipp Jeitner, Haya Shulman, M. Waidner","doi":"10.1109/DSN-S50200.2020.00027","DOIUrl":"https://doi.org/10.1109/DSN-S50200.2020.00027","url":null,"abstract":"The critical role that Network Time Protocol (NTP) plays in the Internet led to multiple efforts to secure it against time-shifting attacks. A recent proposal for enhancing the security of NTP with Chronos against on-path attackers seems the most promising one and is on a standardisation track of the IETF. In this work we demonstrate off-path attacks against Chronos enhanced NTP clients. The weak link is a central security feature of Chronos: The server pool generation mechanism using DNS. We show that the insecurity of DNS allows to subvert the security of Chronos making the time-shifting attacks against Chronos-NTP even easier than attacks against plain NTP.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117173739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Safeguarding Data Consistency at the Edge 保护边缘数据一致性
Cláudio Correia
We propose to design and implement a secure edge storage system. Edge computing is a paradigm that extends cloud computing with storage and processing capacity close to the edge of the network, supporting new applications that require low latency. It assumes the availability of fog nodes that are located close to the edge. However, fog nodes are likely to be vulnerable to tampering. A malicious fog node can manipulate, create or delete data from edge applications, leading this application into a fail state, impacting the quality of service. Therefore, it is important to secure the functions fog nodes provide. To achieve our goal we plan to leverage the use of secure hardware (e.g., Intel SGX) as a means to harden the implementation. However, as we discuss here, SGX alone is not enough to achieve the qualities we consider necessary to support edge applications, such as low latency, scalability, and multiple models of data consistency. In this work, we present the main challenges in the design of a secure edge storage system and point to the research directions that we plan to follow to address these challenges.
我们建议设计并实现一个安全的边缘存储系统。边缘计算是一种扩展云计算的范例,其存储和处理能力接近网络边缘,支持需要低延迟的新应用程序。它假设位于边缘附近的雾节点的可用性。然而,雾节点很可能容易被篡改。恶意雾节点可以操纵、创建或删除边缘应用程序中的数据,导致该应用程序进入故障状态,从而影响服务质量。因此,保护雾节点提供的功能非常重要。为了实现我们的目标,我们计划利用安全硬件(例如,Intel SGX)作为强化实现的手段。然而,正如我们在这里讨论的那样,SGX本身不足以实现我们认为支持边缘应用程序所必需的质量,例如低延迟、可伸缩性和多模型的数据一致性。在这项工作中,我们提出了安全边缘存储系统设计中的主要挑战,并指出了我们计划遵循的研究方向,以应对这些挑战。
{"title":"Safeguarding Data Consistency at the Edge","authors":"Cláudio Correia","doi":"10.1109/dsn-s50200.2020.00035","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00035","url":null,"abstract":"We propose to design and implement a secure edge storage system. Edge computing is a paradigm that extends cloud computing with storage and processing capacity close to the edge of the network, supporting new applications that require low latency. It assumes the availability of fog nodes that are located close to the edge. However, fog nodes are likely to be vulnerable to tampering. A malicious fog node can manipulate, create or delete data from edge applications, leading this application into a fail state, impacting the quality of service. Therefore, it is important to secure the functions fog nodes provide. To achieve our goal we plan to leverage the use of secure hardware (e.g., Intel SGX) as a means to harden the implementation. However, as we discuss here, SGX alone is not enough to achieve the qualities we consider necessary to support edge applications, such as low latency, scalability, and multiple models of data consistency. In this work, we present the main challenges in the design of a secure edge storage system and point to the research directions that we plan to follow to address these challenges.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133978642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MPC for Securing Internet Infrastructure 保护互联网基础设施的MPC
Kris Shrishak, Haya Shulman
Secure multiparty computation (MPC) allows multiple entities to perform joint computation over their private inputs, revealing only the output. Although it was considered to be "not efficient enough" for many years, recent advances have shown that secure computation can be practical for specific applications. These applications have ranged from privacy-preserving auctions to private machine learning. In this work we explore the use of MPC for securing Internet infrastructure. We show that basic Internet systems, such as routing and DNS, rely on centralised authorities. Nevertheless, vulnerabilities as well as conflicting interests often make this requirement for trust not suitable for practical purposes. In this work, we set forth to explore replacement of trust in centralised authorities in Internet infrastructure with secure MPC.
安全多方计算(MPC)允许多个实体对其私有输入执行联合计算,只显示输出。尽管多年来人们一直认为安全计算“不够有效”,但最近的进展表明,安全计算对于特定的应用是可行的。这些应用范围从保护隐私的拍卖到私人机器学习。在这项工作中,我们探索使用MPC来保护互联网基础设施。我们展示了基本的互联网系统,如路由和DNS,依赖于集中的权威。然而,脆弱性和利益冲突往往使这种信任要求不适合实际目的。在这项工作中,我们着手探索用安全的MPC取代对互联网基础设施中中央权威的信任。
{"title":"MPC for Securing Internet Infrastructure","authors":"Kris Shrishak, Haya Shulman","doi":"10.1109/dsn-s50200.2020.00026","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00026","url":null,"abstract":"Secure multiparty computation (MPC) allows multiple entities to perform joint computation over their private inputs, revealing only the output. Although it was considered to be \"not efficient enough\" for many years, recent advances have shown that secure computation can be practical for specific applications. These applications have ranged from privacy-preserving auctions to private machine learning. In this work we explore the use of MPC for securing Internet infrastructure. We show that basic Internet systems, such as routing and DNS, rely on centralised authorities. Nevertheless, vulnerabilities as well as conflicting interests often make this requirement for trust not suitable for practical purposes. In this work, we set forth to explore replacement of trust in centralised authorities in Internet infrastructure with secure MPC.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129849850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The InterPlanetary File System and the Filecoin Network 星际文件系统和文件币网络
Yiannis Psaras, David Dias
The InterPlanetary File System (IPFS) is a peer-to-peer content-addressable distributed file system that seeks to connect all computing devices with the same system of files. It is an open-source community-driven project, with reference implementations in Go and Javascript, and a global community of millions of users. IPFS and libp2p, which is the modular network stack of IPFS, are based on name-resolution based routing. The resolution system is based on Kademlia DHT and content is addressed by flat hash-based names. IPFS sees significant real-world usage, with over 250,000 daily active network nodes, millions of end users and wide adoption by several other projects in the Decentralised Web space, but not only. An adjacent project to IPFS, which was also masterminded and is also being developed within Protocol Labs (the umbrella company of IPFS and libp2p) is filecoin. Filecoin is a token protocol that supports a decentralised storage network. Storage miners are rewarded according to their contribution to the network and the mechanics of filecoin secure the network against malicious activity. The objective of this half-day tutorial is to make the audience familiar with IPFS and filecoin and able to use the tools provided by the project for research and development. The tutorial targets both developers and researchers, who may contribute to the project or use it as a tool.
星际文件系统(IPFS)是一个点对点内容可寻址的分布式文件系统,它试图将所有计算设备与同一文件系统连接起来。它是一个开源社区驱动的项目,有Go和Javascript的参考实现,以及一个拥有数百万用户的全球社区。IPFS和libp2p (IPFS的模块化网络堆栈)都基于基于名称解析的路由。解析系统基于Kademlia DHT,内容通过基于散列的名称进行寻址。IPFS在现实世界中有着重要的应用,每天有超过250,000个活跃的网络节点,数百万终端用户,并被分散Web空间中的其他几个项目广泛采用,但不仅仅如此。与IPFS相邻的一个项目是filecoin,它也是由Protocol Labs (IPFS和libp2p的保护伞公司)策划并正在开发的。Filecoin是一种支持分散存储网络的令牌协议。存储矿工根据他们对网络的贡献获得奖励,文件币的机制保护网络免受恶意活动的侵害。这个半天的教程的目的是让观众熟悉IPFS和filecoin,并能够使用项目提供的工具进行研究和开发。本教程面向开发人员和研究人员,他们可能为项目做出贡献或将其用作工具。
{"title":"The InterPlanetary File System and the Filecoin Network","authors":"Yiannis Psaras, David Dias","doi":"10.1109/DSN-S50200.2020.00043","DOIUrl":"https://doi.org/10.1109/DSN-S50200.2020.00043","url":null,"abstract":"The InterPlanetary File System (IPFS) is a peer-to-peer content-addressable distributed file system that seeks to connect all computing devices with the same system of files. It is an open-source community-driven project, with reference implementations in Go and Javascript, and a global community of millions of users. IPFS and libp2p, which is the modular network stack of IPFS, are based on name-resolution based routing. The resolution system is based on Kademlia DHT and content is addressed by flat hash-based names. IPFS sees significant real-world usage, with over 250,000 daily active network nodes, millions of end users and wide adoption by several other projects in the Decentralised Web space, but not only. An adjacent project to IPFS, which was also masterminded and is also being developed within Protocol Labs (the umbrella company of IPFS and libp2p) is filecoin. Filecoin is a token protocol that supports a decentralised storage network. Storage miners are rewarded according to their contribution to the network and the mechanics of filecoin secure the network against malicious activity. The objective of this half-day tutorial is to make the audience familiar with IPFS and filecoin and able to use the tools provided by the project for research and development. The tutorial targets both developers and researchers, who may contribute to the project or use it as a tool.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132355426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Design and Performance Analysis of Software Defined Networking Based Web Services Adopting Moving Target Defense 采用移动目标防御的基于软件定义网络的Web服务设计与性能分析
Dong Seong Kim, Minjune Kim, Jin-Hee Cho, Hyuk Lim, T. Moore, Frederica Free-Nelson
Moving Target Defense (MTD) has been emerged as a promising countermeasure to defend systems against cyberattacks asymmetrically while working well with legacy security and defense mechanisms. MTD provides proactive security services by dynamically altering attack surfaces and increasing attack cost or complexity to prevent further escalation of the attack. However, one of the non-trivial hurdles in deploying MTD techniques is how to handle potential performance degradation (e.g., interruptions of service availability) and maintain acceptable quality-of-service (QoS) in an MTD-enabled system. In this paper, we derive the service performance metrics (e.g., an extent of failed jobs) to measure how much performance degradation is introduced due to MTD operations, and propose QoS-aware service strategies (i.e., drop and wait) to manage ongoing jobs with the minimum performance degradation even under MTD operations running. We evaluate the service performance of software-defined networking (SDN)-based web services (i.e., Apache web servers). Our experimental results prove that the MTD-enabled system can minimize performance degradation by using the proposed job management strategies. The proposed strategies aim to optimize a specific service configuration (e.g., types of jobs and request rates) and effectively minimize the adverse impact of deploying MTD in the system with acceptable QoS while retaining the security effect of IP shuffling-based MTD.
移动目标防御(MTD)已成为一种有前途的对策,可以在与传统安全和防御机制良好配合的同时,保护系统免受非对称网络攻击。MTD通过动态改变攻击面和增加攻击成本或复杂性来提供主动安全服务,以防止攻击的进一步升级。然而,部署MTD技术的一个重要障碍是如何处理潜在的性能下降(例如,服务可用性中断)并在启用MTD的系统中保持可接受的服务质量(QoS)。在本文中,我们推导了服务性能指标(例如,失败作业的程度)来衡量由于MTD操作而引入的性能下降程度,并提出了qos感知服务策略(即,放弃和等待),以管理正在进行的作业,即使在MTD操作运行时也能以最小的性能下降。我们评估了基于软件定义网络(SDN)的web服务(即Apache web服务器)的服务性能。我们的实验结果证明,通过使用所提出的作业管理策略,启用mtd的系统可以最大限度地降低性能下降。所提出的策略旨在优化特定的业务配置(例如,作业类型和请求速率),并有效地减少在具有可接受QoS的系统中部署MTD的不利影响,同时保留基于IP shuffle的MTD的安全效果。
{"title":"Design and Performance Analysis of Software Defined Networking Based Web Services Adopting Moving Target Defense","authors":"Dong Seong Kim, Minjune Kim, Jin-Hee Cho, Hyuk Lim, T. Moore, Frederica Free-Nelson","doi":"10.1109/dsn-s50200.2020.00024","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00024","url":null,"abstract":"Moving Target Defense (MTD) has been emerged as a promising countermeasure to defend systems against cyberattacks asymmetrically while working well with legacy security and defense mechanisms. MTD provides proactive security services by dynamically altering attack surfaces and increasing attack cost or complexity to prevent further escalation of the attack. However, one of the non-trivial hurdles in deploying MTD techniques is how to handle potential performance degradation (e.g., interruptions of service availability) and maintain acceptable quality-of-service (QoS) in an MTD-enabled system. In this paper, we derive the service performance metrics (e.g., an extent of failed jobs) to measure how much performance degradation is introduced due to MTD operations, and propose QoS-aware service strategies (i.e., drop and wait) to manage ongoing jobs with the minimum performance degradation even under MTD operations running. We evaluate the service performance of software-defined networking (SDN)-based web services (i.e., Apache web servers). Our experimental results prove that the MTD-enabled system can minimize performance degradation by using the proposed job management strategies. The proposed strategies aim to optimize a specific service configuration (e.g., types of jobs and request rates) and effectively minimize the adverse impact of deploying MTD in the system with acceptable QoS while retaining the security effect of IP shuffling-based MTD.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133800381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Message from the Doctoral Forum Chairs 来自博士论坛主席的信息
S. Bouchenak, S. Zonouz
DSN 2020 Doctoral Forum would not have been possible without the help and dedication of a large team of volunteers. First, we would like to thank the authors who submitted their work. We also would like to thank all the Doctoral Forum Program Committee members who worked hard to set up this program, namely Azzam Alsudais, Amy Babay, Sophie Cerf, Maria Fernandes, Mohamad Gharib, Pierre-François Gimenez, Matthias Hille, Georgios Mappouras, Isabelly Rocha, Rania Talbi, Hui Xu. Finally, we are very grateful to the Steering Committee and the Local Organizing Committee whose action and help have been instrumental in setting up DSN 2020 Doctoral Forum.
DSN 2020博士论坛的成功举办离不开一大批志愿者的帮助和奉献。首先,我们要感谢提交作品的作者。我们还要感谢所有为这个项目付出辛勤努力的博士论坛项目委员会成员,他们是Azzam Alsudais、Amy Babay、Sophie Cerf、Maria Fernandes、Mohamad Gharib、pierre - franois Gimenez、Matthias Hille、Georgios Mappouras、Isabelly Rocha、Rania Talbi、Hui Xu。最后,我们非常感谢指导委员会和地方组委会,他们的行动和帮助为DSN 2020博士论坛的建立起到了重要作用。
{"title":"Message from the Doctoral Forum Chairs","authors":"S. Bouchenak, S. Zonouz","doi":"10.1109/dsn-s50200.2020.00008","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00008","url":null,"abstract":"DSN 2020 Doctoral Forum would not have been possible without the help and dedication of a large team of volunteers. First, we would like to thank the authors who submitted their work. We also would like to thank all the Doctoral Forum Program Committee members who worked hard to set up this program, namely Azzam Alsudais, Amy Babay, Sophie Cerf, Maria Fernandes, Mohamad Gharib, Pierre-François Gimenez, Matthias Hille, Georgios Mappouras, Isabelly Rocha, Rania Talbi, Hui Xu. Finally, we are very grateful to the Steering Committee and the Local Organizing Committee whose action and help have been instrumental in setting up DSN 2020 Doctoral Forum.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128807156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Coding Styles on Behaviours of Static Analysis Tools for Web Applications 编码风格对Web应用程序静态分析工具行为的影响
Ibéria Medeiros, N. Neves
Web applications have become an essential resource to access the services of diverse subjects (e.g., financial, healthcare) available on the Internet. Despite the efforts that have been made on its security, namely on the investigation of better techniques to detect vulnerabilities on its source code, the number of vulnerabilities exploited has not decreased. Static analysis tools (SATs) are often used to test the security of applications since their outcomes can help developers in the correction of the bugs they found. The conducted investigation made over SATs stated they often generate errors (false positives (FP) and false negatives (FN)), whose cause is recurrently associated with very diverse coding styles, i.e., similar functionality is implemented in distinct manners, and programming practices that create ambiguity, such as the reuse and share of variables. Based on a common practice of using multiple forms in a same webpage and its processing in a single file, we defined a use case for user login and register with six coding styles scenarios for processing their data, and evaluated the behaviour of three SATs (phpSAFE, RIPS and WAP) with them to verify and understand why SATs produce FP and FN.
Web应用程序已成为访问Internet上提供的各种主题(例如金融、医疗保健)服务的基本资源。尽管在其安全性方面做出了努力,即研究更好的技术来检测其源代码中的漏洞,但被利用的漏洞数量并没有减少。静态分析工具(sat)通常用于测试应用程序的安全性,因为它们的结果可以帮助开发人员纠正他们发现的错误。对sat进行的调查表明,它们经常产生错误(假阳性(FP)和假阴性(FN)),其原因通常与非常不同的编码风格有关,即,以不同的方式实现类似的功能,以及产生歧义的编程实践,例如变量的重用和共享。基于在同一网页中使用多个表单及其在单个文件中的处理的常见做法,我们定义了一个用户登录和注册的用例,使用六种编码风格场景来处理他们的数据,并评估了三个sat (phpSAFE, RIPS和WAP)的行为,以验证和理解为什么sat会产生FP和FN。
{"title":"Impact of Coding Styles on Behaviours of Static Analysis Tools for Web Applications","authors":"Ibéria Medeiros, N. Neves","doi":"10.1109/DSN-S50200.2020.00030","DOIUrl":"https://doi.org/10.1109/DSN-S50200.2020.00030","url":null,"abstract":"Web applications have become an essential resource to access the services of diverse subjects (e.g., financial, healthcare) available on the Internet. Despite the efforts that have been made on its security, namely on the investigation of better techniques to detect vulnerabilities on its source code, the number of vulnerabilities exploited has not decreased. Static analysis tools (SATs) are often used to test the security of applications since their outcomes can help developers in the correction of the bugs they found. The conducted investigation made over SATs stated they often generate errors (false positives (FP) and false negatives (FN)), whose cause is recurrently associated with very diverse coding styles, i.e., similar functionality is implemented in distinct manners, and programming practices that create ambiguity, such as the reuse and share of variables. Based on a common practice of using multiple forms in a same webpage and its processing in a single file, we defined a use case for user login and register with six coding styles scenarios for processing their data, and evaluated the behaviour of three SATs (phpSAFE, RIPS and WAP) with them to verify and understand why SATs produce FP and FN.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128044155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1