首页 > 最新文献

Proceedings of the 11th Annual Cyber and Information Security Research Conference最新文献

英文 中文
Classification of Insider Threat Detection Techniques 内部威胁检测技术分类
Ameya Sanzgiri, D. Dasgupta
Most insider attacks done by people who have the knowledge and technical know-how of launching such attacks. This topic has long been studied and many detection techniques were proposed to deal with insider threats. This short paper summarized and classified insider threat detection techniques based on strategies used for detection.
大多数内部攻击都是由拥有发起此类攻击的知识和技术诀窍的人进行的。这个主题已经研究了很长时间,并提出了许多检测技术来处理内部威胁。本文基于检测策略对内部威胁检测技术进行了总结和分类。
{"title":"Classification of Insider Threat Detection Techniques","authors":"Ameya Sanzgiri, D. Dasgupta","doi":"10.1145/2897795.2897799","DOIUrl":"https://doi.org/10.1145/2897795.2897799","url":null,"abstract":"Most insider attacks done by people who have the knowledge and technical know-how of launching such attacks. This topic has long been studied and many detection techniques were proposed to deal with insider threats. This short paper summarized and classified insider threat detection techniques based on strategies used for detection.","PeriodicalId":427043,"journal":{"name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130147728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Bringing Federated Identity to Grid Computing 将联邦身份引入网格计算
J. Teheran, D. Dykstra, Mine Altunay
The Fermi National Accelerator Laboratory (FNAL) is facing the challenge of providing scientific data access and grid submission to scientific collaborations that span the globe but are hosted at FNAL. Researchers in these collaborations are currently required to register as FNAL users and obtain FNAL credentials to access grid resources to perform their scientific computations. These requirements burden researchers with managing additional authentication credentials, and put additional load on FNAL for managing user identities. Our design integrates the existing InCommon federated identity infrastructure, CILogon Basic CA, and MyProxy with the FNAL grid submission system to provide secure access for users from diverse experiments and collaborations without requiring each user to have authentication credentials from FNAL. The design automates the handling of certificates, so users do not need to manage them manually. Although the initial implementation is for FNAL's grid submission system, the design and the core of the implementation are general and could be applied to other distributed computing systems.
费米国家加速器实验室(FNAL)正面临着为横跨全球的科学合作提供科学数据访问和网格提交的挑战,但这些合作是在FNAL托管的。目前,这些合作的研究人员需要注册为FNAL用户并获得FNAL证书才能访问网格资源以执行他们的科学计算。这些需求增加了研究人员管理额外身份验证凭证的负担,并给管理用户身份的FNAL带来了额外的负担。我们的设计将现有的InCommon联邦身份基础设施、CILogon基本CA和MyProxy与FNAL网格提交系统集成在一起,为来自不同实验和协作的用户提供安全访问,而无需每个用户拥有FNAL的身份验证凭据。该设计自动化了证书的处理,因此用户不需要手动管理它们。虽然最初的实现是针对FNAL的网格提交系统,但其设计和实现的核心是通用的,可以应用于其他分布式计算系统。
{"title":"Bringing Federated Identity to Grid Computing","authors":"J. Teheran, D. Dykstra, Mine Altunay","doi":"10.1145/2897795.2897807","DOIUrl":"https://doi.org/10.1145/2897795.2897807","url":null,"abstract":"The Fermi National Accelerator Laboratory (FNAL) is facing the challenge of providing scientific data access and grid submission to scientific collaborations that span the globe but are hosted at FNAL. Researchers in these collaborations are currently required to register as FNAL users and obtain FNAL credentials to access grid resources to perform their scientific computations. These requirements burden researchers with managing additional authentication credentials, and put additional load on FNAL for managing user identities. Our design integrates the existing InCommon federated identity infrastructure, CILogon Basic CA, and MyProxy with the FNAL grid submission system to provide secure access for users from diverse experiments and collaborations without requiring each user to have authentication credentials from FNAL. The design automates the handling of certificates, so users do not need to manage them manually. Although the initial implementation is for FNAL's grid submission system, the design and the core of the implementation are general and could be applied to other distributed computing systems.","PeriodicalId":427043,"journal":{"name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117032073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Addressing Critical Industrial Control System Cyber Security Concerns via High Fidelity Simulation 通过高保真仿真解决关键工业控制系统网络安全问题
R. Vaughn, T. Morris
This paper outlines a set of 10 cyber security concerns associated with Industrial Control Systems (ICS). The concerns address software and hardware development, implementation, and maintenance practices, supply chain assurance, the need for cyber forensics in ICS, a lack of awareness and training, and finally, a need for test beds which can be used to address the first 9 cited concerns. The concerns documented in this paper were developed based on the authors' combined experience conducting research in this field for the US Department of Homeland Security, the National Science Foundation, and the Department of Defense. The second half of this paper documents a virtual test bed platform which is offered as a tool to address the concerns listed in the first half of the paper. The paper discusses various types of test beds proposed in literature for ICS research, provides an overview of the virtual test bed platform developed by the authors, and lists future works required to extend the existing test beds to serve as a development platform.
本文概述了与工业控制系统(ICS)相关的10个网络安全问题。这些问题涉及软件和硬件的开发、实现和维护实践、供应链保证、ICS中网络取证的需求、意识和培训的缺乏,以及对测试平台的需求,可用于解决前面提到的9个问题。本文中所记录的问题是基于作者在这一领域为美国国土安全部、国家科学基金会和国防部进行研究的综合经验而制定的。本文的后半部分记录了一个虚拟测试平台,该平台是作为解决本文前半部分所列出的问题的工具提供的。本文讨论了文献中提出的用于ICS研究的各种类型的试验台,概述了作者开发的虚拟试验台平台,并列出了扩展现有试验台作为开发平台所需的未来工作。
{"title":"Addressing Critical Industrial Control System Cyber Security Concerns via High Fidelity Simulation","authors":"R. Vaughn, T. Morris","doi":"10.1145/2897795.2897819","DOIUrl":"https://doi.org/10.1145/2897795.2897819","url":null,"abstract":"This paper outlines a set of 10 cyber security concerns associated with Industrial Control Systems (ICS). The concerns address software and hardware development, implementation, and maintenance practices, supply chain assurance, the need for cyber forensics in ICS, a lack of awareness and training, and finally, a need for test beds which can be used to address the first 9 cited concerns. The concerns documented in this paper were developed based on the authors' combined experience conducting research in this field for the US Department of Homeland Security, the National Science Foundation, and the Department of Defense. The second half of this paper documents a virtual test bed platform which is offered as a tool to address the concerns listed in the first half of the paper. The paper discusses various types of test beds proposed in literature for ICS research, provides an overview of the virtual test bed platform developed by the authors, and lists future works required to extend the existing test beds to serve as a development platform.","PeriodicalId":427043,"journal":{"name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128174573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Double Helix and RAVEN: A System for Cyber Fault Tolerance and Recovery 双螺旋和RAVEN:一个网络容错和恢复系统
M. Co, J. Davidson, Jason Hiser, J. Knight, A. Nguyen-Tuong, Westley Weimer, Jonathan Burket, Gregory L. Frazier, T. Frazier, B. Dutertre, Ian A. Mason, N. Shankar, S. Forrest
Cyber security research has produced numerous artificial diversity techniques such as address space layout randomization, heap randomization, instruction-set randomization, and instruction location randomization. To be most effective, these techniques must be high entropy and secure from information leakage which, in practice, is often difficult to achieve. Indeed, it has been demonstrated that well-funded, determined adversaries can often circumvent these defenses. To allow use of low-entropy diversity, prevent information leakage, and provide provable security against attacks, previous research proposed using low-entropy but carefully structured artificial diversity to create variants of an application and then run these constructed variants within a fault-tolerant environment that runs each variant in parallel and cross check results to detect and mitigate faults. If the variants are carefully constructed, it is possible to prove that certain classes of attack are not possible. This paper presents an overview and status of a cyber fault tolerant system that uses a low overhead multi-variant execution environment and precise static binary analysis and efficient rewriting technology to produce structured variants which allow automated verification techniques to prove security properties of the system. Preliminary results are presented which demonstrate that the system is capable of detecting unknown faults and mitigating attacks.
网络安全研究已经产生了许多人工多样性技术,如地址空间布局随机化、堆随机化、指令集随机化和指令位置随机化。为了达到最有效的效果,这些技术必须具有高熵和信息泄漏的安全性,而这在实践中往往很难实现。事实上,事实证明,资金充足、意志坚定的对手往往可以绕过这些防御措施。为了允许使用低熵多样性,防止信息泄漏,并提供可证明的攻击安全性,先前的研究建议使用低熵但精心结构的人工多样性来创建应用程序的变体,然后在容错环境中运行这些构造的变体,该环境并行运行每个变体并交叉检查结果以检测和减轻错误。如果变体是精心构造的,就有可能证明某些类别的攻击是不可能的。本文介绍了一种网络容错系统的概述和现状,该系统使用低开销的多变体执行环境和精确的静态二进制分析和高效的重写技术来生成结构化变体,从而允许自动验证技术来证明系统的安全性。初步结果表明,该系统具有检测未知故障和减轻攻击的能力。
{"title":"Double Helix and RAVEN: A System for Cyber Fault Tolerance and Recovery","authors":"M. Co, J. Davidson, Jason Hiser, J. Knight, A. Nguyen-Tuong, Westley Weimer, Jonathan Burket, Gregory L. Frazier, T. Frazier, B. Dutertre, Ian A. Mason, N. Shankar, S. Forrest","doi":"10.1145/2897795.2897805","DOIUrl":"https://doi.org/10.1145/2897795.2897805","url":null,"abstract":"Cyber security research has produced numerous artificial diversity techniques such as address space layout randomization, heap randomization, instruction-set randomization, and instruction location randomization. To be most effective, these techniques must be high entropy and secure from information leakage which, in practice, is often difficult to achieve. Indeed, it has been demonstrated that well-funded, determined adversaries can often circumvent these defenses. To allow use of low-entropy diversity, prevent information leakage, and provide provable security against attacks, previous research proposed using low-entropy but carefully structured artificial diversity to create variants of an application and then run these constructed variants within a fault-tolerant environment that runs each variant in parallel and cross check results to detect and mitigate faults. If the variants are carefully constructed, it is possible to prove that certain classes of attack are not possible. This paper presents an overview and status of a cyber fault tolerant system that uses a low overhead multi-variant execution environment and precise static binary analysis and efficient rewriting technology to produce structured variants which allow automated verification techniques to prove security properties of the system. Preliminary results are presented which demonstrate that the system is capable of detecting unknown faults and mitigating attacks.","PeriodicalId":427043,"journal":{"name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125213170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Dynamic Canary Randomization for Improved Software Security 动态金丝雀随机化提高软件安全性
William H. Hawkins, Jason Hiser, J. Davidson
Stack canaries are a well-known and effective technique for detecting and defeating stack overflow attacks. However, they are not perfect. For programs compiled using gcc, the reference canary value is randomly generated at program invocation and fixed throughout execution. Moreover, for software running on the Linux operating system, canary values are inherited from the parent process and only changed if/when the child process exec()s a different program. Researchers and others have exploited these behaviors to craft real-world attacks that bypass the protections of stack canaries. This paper describes a moving-target stack canary technique that prevents such attacks. The Dynamic Canary Randomization technique (DCR) rerandomizes stack canaries at runtime. DCR is applied directly to the binary using a static binary rewriter (i.e., it does not require access to the program's source code). DCR operates with minimal overhead and gives the user the flexibility to specify the conditions under which to rerandomize the canary. DCR is an improvement over existing canary rerandomizers because it allows rerandomization to be applied at any point during execution and at any frequency. We show that DCR improves software security by demonstrating its ability to prevent real-world attacks on well-known software (e.g., nginx) "protected" by traditional stack canaries.
堆栈金丝雀是检测和击败堆栈溢出攻击的一种众所周知且有效的技术。然而,它们并不完美。对于使用gcc编译的程序,参考金丝雀值在程序调用时随机生成,并在整个执行过程中固定。此外,对于运行在Linux操作系统上的软件,金丝雀值是从父进程继承的,只有当子进程exec()是一个不同的程序时才会改变。研究人员和其他人已经利用这些行为来制造绕过堆栈金丝雀保护的真实攻击。本文描述了一种防止此类攻击的移动目标堆栈金丝雀技术。动态金丝雀随机化技术(DCR)在运行时对堆栈金丝雀进行重新随机化。DCR使用静态二进制重写器直接应用于二进制文件(即,它不需要访问程序的源代码)。DCR以最小的开销运行,并使用户能够灵活地指定重新随机化金丝雀的条件。DCR是对现有的金丝雀重随机化器的改进,因为它允许在执行期间的任何时间点以任何频率应用重随机化。我们展示了DCR通过展示其防止对知名软件(例如nginx)的真实攻击的能力来提高软件安全性。被传统的堆栈金丝雀“保护”。
{"title":"Dynamic Canary Randomization for Improved Software Security","authors":"William H. Hawkins, Jason Hiser, J. Davidson","doi":"10.1145/2897795.2897803","DOIUrl":"https://doi.org/10.1145/2897795.2897803","url":null,"abstract":"Stack canaries are a well-known and effective technique for detecting and defeating stack overflow attacks. However, they are not perfect. For programs compiled using gcc, the reference canary value is randomly generated at program invocation and fixed throughout execution. Moreover, for software running on the Linux operating system, canary values are inherited from the parent process and only changed if/when the child process exec()s a different program. Researchers and others have exploited these behaviors to craft real-world attacks that bypass the protections of stack canaries. This paper describes a moving-target stack canary technique that prevents such attacks. The Dynamic Canary Randomization technique (DCR) rerandomizes stack canaries at runtime. DCR is applied directly to the binary using a static binary rewriter (i.e., it does not require access to the program's source code). DCR operates with minimal overhead and gives the user the flexibility to specify the conditions under which to rerandomize the canary. DCR is an improvement over existing canary rerandomizers because it allows rerandomization to be applied at any point during execution and at any frequency. We show that DCR improves software security by demonstrating its ability to prevent real-world attacks on well-known software (e.g., nginx) \"protected\" by traditional stack canaries.","PeriodicalId":427043,"journal":{"name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","volume":"376 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115360433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Network Modeling for Security Analytics 安全分析的网络建模
B. Smith, Whitney Caruthers, Dalton Stewart, P. Hawrylak, John Hale
Comprehensive network modeling remains a challenge for the security analyst. Complete coverage and depth of detail in network models is difficult to achieve for large and complex networks, especially when significant effort in manual elaboration is required. This paper describes an automated approach to network model acquisition using coordinated bump-in-the-wire devices. The system described here relieves a substantial burden from the modeler while offering improved visibility over competing solutions.
对安全分析人员来说,全面的网络建模仍然是一个挑战。对于大型和复杂的网络来说,网络模型的完整覆盖和细节深度很难实现,特别是当需要大量的人工精化工作时。本文描述了一种使用协调的线中碰撞装置自动获取网络模型的方法。这里描述的系统减轻了建模者的大量负担,同时提供了优于竞争解决方案的可见性。
{"title":"Network Modeling for Security Analytics","authors":"B. Smith, Whitney Caruthers, Dalton Stewart, P. Hawrylak, John Hale","doi":"10.1145/2897795.2897817","DOIUrl":"https://doi.org/10.1145/2897795.2897817","url":null,"abstract":"Comprehensive network modeling remains a challenge for the security analyst. Complete coverage and depth of detail in network models is difficult to achieve for large and complex networks, especially when significant effort in manual elaboration is required. This paper describes an automated approach to network model acquisition using coordinated bump-in-the-wire devices. The system described here relieves a substantial burden from the modeler while offering improved visibility over competing solutions.","PeriodicalId":427043,"journal":{"name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128734879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Trusted Information Exchange Using Trusted Network Processors 使用可信网络处理器的可信信息交换
S. Tucker
Today's systems are increasingly complex consisting of many components designed by multiple competing vendors. Trust management relies heavily on situational awareness of the operating environment, and comprehensive knowledge of components and their relationship to others. Outsourcing and modularity are necessary to reduce cost and increase manageability, but can make it difficult to gather enough information for valid trust decisions. Invalid trust assumptions could lead to vulnerabilities in the future. Furthermore, when components are integrated with information systems these difficulties can increase greatly. This paper presents how trust is applied to information systems, a trust framework based on Trusted Network Processors and an implementation of a trusted information system which allows disjointed component systems to communicate while preserving trust assumptions in a dynamically changing environment.
今天的系统越来越复杂,由多个竞争供应商设计的许多组件组成。信任管理在很大程度上依赖于对操作环境的态势感知,以及对组件及其与他人关系的全面了解。外包和模块化对于降低成本和提高可管理性是必要的,但可能会使收集足够的信息以进行有效的信任决策变得困难。无效的信任假设可能导致将来出现漏洞。此外,当组件与信息系统集成时,这些困难可能会大大增加。本文介绍了如何将信任应用于信息系统,一个基于可信网络处理器的信任框架和一个可信信息系统的实现,该系统允许脱节的组件系统在动态变化的环境中进行通信,同时保持信任假设。
{"title":"Trusted Information Exchange Using Trusted Network Processors","authors":"S. Tucker","doi":"10.1145/2897795.2897809","DOIUrl":"https://doi.org/10.1145/2897795.2897809","url":null,"abstract":"Today's systems are increasingly complex consisting of many components designed by multiple competing vendors. Trust management relies heavily on situational awareness of the operating environment, and comprehensive knowledge of components and their relationship to others. Outsourcing and modularity are necessary to reduce cost and increase manageability, but can make it difficult to gather enough information for valid trust decisions. Invalid trust assumptions could lead to vulnerabilities in the future. Furthermore, when components are integrated with information systems these difficulties can increase greatly. This paper presents how trust is applied to information systems, a trust framework based on Trusted Network Processors and an implementation of a trusted information system which allows disjointed component systems to communicate while preserving trust assumptions in a dynamically changing environment.","PeriodicalId":427043,"journal":{"name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114182914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Selecting and Recommending Online Software Services by Evaluating External Attributes 通过评价外部属性来选择和推荐在线软件服务
Lahiru S. Gallege, R. Raje
Selecting an online software service for a given set of requirements can be based on the quality of results (i.e., relative ranking of the services) and associated recommendations (i.e., applicability of the suggested services). Prevalent approaches for product-based selection (e.g., the ones used by Amazon) and recommendations, such as Content-based Filtering (CBF) and Collaborative Filtering (CLF) do not typically consider information about products beyond primitive attribute-value pairs. Compared to a tangible physical product, a reusable and updatable software service cannot be effectively described using only a set of strict attribute-value pairs or using a sparse matrix of user-product relationship. This is because a software service has various programmatic, functional, and non-functional properties which potentially could also be dynamic in nature. Due to these challenges, it is not sufficient to apply product-based ranking and recommendation techniques to software services available from a marketplace. This research proposes an approach for better selection and recommendation of software services that enhances both CBF and CLF algorithms, using external reviews.
为给定的一组需求选择在线软件服务可以基于结果的质量(即,服务的相对排名)和相关的建议(即,所建议服务的适用性)。基于产品的选择(例如Amazon所使用的)和推荐的流行方法,如基于内容的过滤(CBF)和协同过滤(CLF)通常不考虑原始属性值对之外的产品信息。与有形的物理产品相比,仅使用一组严格的属性值对或使用稀疏的用户-产品关系矩阵不能有效地描述可重用和可更新的软件服务。这是因为软件服务具有各种程序性、功能性和非功能性属性,这些属性在本质上也可能是动态的。由于这些挑战,将基于产品的排名和推荐技术应用于市场上可用的软件服务是不够的。本研究提出了一种使用外部评审来更好地选择和推荐软件服务的方法,该方法可以增强CBF和CLF算法。
{"title":"Towards Selecting and Recommending Online Software Services by Evaluating External Attributes","authors":"Lahiru S. Gallege, R. Raje","doi":"10.1145/2897795.2897797","DOIUrl":"https://doi.org/10.1145/2897795.2897797","url":null,"abstract":"Selecting an online software service for a given set of requirements can be based on the quality of results (i.e., relative ranking of the services) and associated recommendations (i.e., applicability of the suggested services). Prevalent approaches for product-based selection (e.g., the ones used by Amazon) and recommendations, such as Content-based Filtering (CBF) and Collaborative Filtering (CLF) do not typically consider information about products beyond primitive attribute-value pairs. Compared to a tangible physical product, a reusable and updatable software service cannot be effectively described using only a set of strict attribute-value pairs or using a sparse matrix of user-product relationship. This is because a software service has various programmatic, functional, and non-functional properties which potentially could also be dynamic in nature. Due to these challenges, it is not sufficient to apply product-based ranking and recommendation techniques to software services available from a marketplace. This research proposes an approach for better selection and recommendation of software services that enhances both CBF and CLF algorithms, using external reviews.","PeriodicalId":427043,"journal":{"name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127347587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The Application of Moving Target Defense to Field Programmable Gate Arrays 运动目标防御在现场可编程门阵列中的应用
John Dombrowski, T. Andel, J. McDonald
Field Programmable Gate Arrays (FPGAs) are powerful and flexible pieces of hardware used in a variety of applications. These chips are used in monitoring network traffic, guidance systems, cryptographic calculations, medical devices, embedded systems, as well as many other varied uses. They can be used in a large number of ways as well as in a large number of areas, which allows for nearly limitless applications. Outside of being used as a cryptographic processor and network monitoring, these chips are not being used to directly provide software/hardware security. FPGAs are extremely widespread in addition to becoming more integrated into the systems that they are a part of. This leads to vulnerabilities in almost every system that uses these chips. One way to combat these FPGA based vulnerabilities in every system using them, is to implement a Moving Target Defense (MTD) on the chip itself. FPGA based MTD would allow each FPGA to enhance, rather than weaken, the security of a system. This paper incorporates previous applications of Field Programmable Gate Arrays, and explores potential software/hardware security implementations for these chips through the application of Moving Target Defenses.
现场可编程门阵列(fpga)是一种功能强大且灵活的硬件,可用于各种应用。这些芯片用于监控网络流量、制导系统、密码计算、医疗设备、嵌入式系统以及许多其他不同的用途。它们可以以多种方式以及在许多领域中使用,这使得几乎无限的应用成为可能。除了用作加密处理器和网络监控之外,这些芯片并不直接用于提供软件/硬件安全。除了越来越多地集成到它们所组成的系统中之外,fpga的应用也非常广泛。这导致几乎所有使用这些芯片的系统都存在漏洞。在每个使用FPGA的系统中,对抗这些基于FPGA的漏洞的一种方法是在芯片本身上实现移动目标防御(MTD)。基于FPGA的MTD将允许每个FPGA增强而不是削弱系统的安全性。本文结合了以前现场可编程门阵列的应用,并通过移动目标防御的应用探索了这些芯片的潜在软件/硬件安全实现。
{"title":"The Application of Moving Target Defense to Field Programmable Gate Arrays","authors":"John Dombrowski, T. Andel, J. McDonald","doi":"10.1145/2897795.2897820","DOIUrl":"https://doi.org/10.1145/2897795.2897820","url":null,"abstract":"Field Programmable Gate Arrays (FPGAs) are powerful and flexible pieces of hardware used in a variety of applications. These chips are used in monitoring network traffic, guidance systems, cryptographic calculations, medical devices, embedded systems, as well as many other varied uses. They can be used in a large number of ways as well as in a large number of areas, which allows for nearly limitless applications. Outside of being used as a cryptographic processor and network monitoring, these chips are not being used to directly provide software/hardware security. FPGAs are extremely widespread in addition to becoming more integrated into the systems that they are a part of. This leads to vulnerabilities in almost every system that uses these chips. One way to combat these FPGA based vulnerabilities in every system using them, is to implement a Moving Target Defense (MTD) on the chip itself. FPGA based MTD would allow each FPGA to enhance, rather than weaken, the security of a system. This paper incorporates previous applications of Field Programmable Gate Arrays, and explores potential software/hardware security implementations for these chips through the application of Moving Target Defenses.","PeriodicalId":427043,"journal":{"name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127464087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Xen Network Flow Analysis for Intrusion Detection 用于入侵检测的Xen网络流分析
R. Johnston, Sun-il Kim, D. Coe, L. Etzkorn, J. Kulick, A. Milenković
Virtualization technology has become ubiquitous in the computing world. With it, a number of security concerns have been amplified as users run adjacently on a single host. In order to prevent attacks from both internal and external sources, the networking of such systems must be secured. Network intrusion detection systems (NIDSs) are an important tool for aiding this effort. These systems work by analyzing flow or packet information to determine malicious intent. However, it is difficult to implement a NIDS on a virtualized system due to their complexity. This is especially true for the Xen hypervisor: Xen has incredible heterogeneity when it comes to implementation, making a generic solution difficult. In this paper, we analyze the network data flow of a typical Xen implementation along with identifying features common to any implementation. We then explore the benefits of placing security checks along the data flow and promote a solution within the hypervisor itself.
虚拟化技术在计算世界中已经无处不在。有了它,当用户在单个主机上邻接地运行时,许多安全问题就被放大了。为了防止来自内部和外部的攻击,这些系统的网络必须得到保护。网络入侵检测系统(nids)是帮助实现这一目标的重要工具。这些系统通过分析流或包信息来确定恶意意图。然而,由于其复杂性,在虚拟化系统上实现NIDS非常困难。对于Xen管理程序来说尤其如此:在实现方面,Xen具有令人难以置信的异构性,这使得通用解决方案变得困难。在本文中,我们分析了一个典型Xen实现的网络数据流,并识别了任何实现的共同特征。然后,我们将探讨在数据流中放置安全检查的好处,并在管理程序本身中推广解决方案。
{"title":"Xen Network Flow Analysis for Intrusion Detection","authors":"R. Johnston, Sun-il Kim, D. Coe, L. Etzkorn, J. Kulick, A. Milenković","doi":"10.1145/2897795.2897802","DOIUrl":"https://doi.org/10.1145/2897795.2897802","url":null,"abstract":"Virtualization technology has become ubiquitous in the computing world. With it, a number of security concerns have been amplified as users run adjacently on a single host. In order to prevent attacks from both internal and external sources, the networking of such systems must be secured. Network intrusion detection systems (NIDSs) are an important tool for aiding this effort. These systems work by analyzing flow or packet information to determine malicious intent. However, it is difficult to implement a NIDS on a virtualized system due to their complexity. This is especially true for the Xen hypervisor: Xen has incredible heterogeneity when it comes to implementation, making a generic solution difficult. In this paper, we analyze the network data flow of a typical Xen implementation along with identifying features common to any implementation. We then explore the benefits of placing security checks along the data flow and promote a solution within the hypervisor itself.","PeriodicalId":427043,"journal":{"name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131607724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the 11th Annual Cyber and Information Security Research Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1