首页 > 最新文献

2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)最新文献

英文 中文
Unsupervised Anomaly Detection Algorithm of Graph Data Based on Graph Kernel 基于图核的图数据无监督异常检测算法
Lili Zhang, Huibin Wang, Chenming Li, Yehong Shao, Qing Ye
Nowadays, there are a lot of graph data in many fields such as biology, medicine, social networks and so on. However, it is difficult to detect anomaly and get the useful information if we want to apply the traditional algorithms in graph data. Statistical pattern recognition and structural pattern recognition are two main methods in pattern recognition. The disadvantage of statistical pattern recognition is that it is difficult to represent the relationship. In the structural pattern recognition, the object is generally expressed as a graph, and the key point is the similarity or matching of the graphs. However, graph matching is complex and NP-hard. Recently, graph kernel is proposed to solve the graph matching problem, so we can map the graphs into vector space. As a result, the operations in the vector space are applicable to graph data. In this paper, we propose a new algorithm to detect anomaly for graph data. Firstly, we use graph kernel to define the similarity of the graphs, and then we convert graph data into vector data. After that, we use the Kernel Principal Component Analysis (KPCA) to reduce the dimension, and then train these data by one-class classifier to get the model for anomaly detection. The experiments on datasets MUTAG and ENZYMES at the end of the paper show the efficiency of proposed algorithm
如今,在生物、医学、社交网络等许多领域都有大量的图形数据。然而,在图数据中应用传统的算法很难检测到异常并获得有用的信息。统计模式识别和结构模式识别是模式识别的两种主要方法。统计模式识别的缺点是难以表示关系。在结构模式识别中,对象一般用图表示,图的相似度或匹配度是关键。然而,图匹配是复杂和np困难的。最近提出了图核来解决图匹配问题,将图映射到向量空间中。因此,向量空间中的操作适用于图数据。本文提出了一种新的图数据异常检测算法。首先利用图核定义图的相似度,然后将图数据转换为向量数据。然后,我们使用核主成分分析(KPCA)对数据进行降维,然后用一类分类器对这些数据进行训练,得到用于异常检测的模型。最后在MUTAG和ENZYMES数据集上的实验验证了算法的有效性
{"title":"Unsupervised Anomaly Detection Algorithm of Graph Data Based on Graph Kernel","authors":"Lili Zhang, Huibin Wang, Chenming Li, Yehong Shao, Qing Ye","doi":"10.1109/CSCloud.2017.23","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.23","url":null,"abstract":"Nowadays, there are a lot of graph data in many fields such as biology, medicine, social networks and so on. However, it is difficult to detect anomaly and get the useful information if we want to apply the traditional algorithms in graph data. Statistical pattern recognition and structural pattern recognition are two main methods in pattern recognition. The disadvantage of statistical pattern recognition is that it is difficult to represent the relationship. In the structural pattern recognition, the object is generally expressed as a graph, and the key point is the similarity or matching of the graphs. However, graph matching is complex and NP-hard. Recently, graph kernel is proposed to solve the graph matching problem, so we can map the graphs into vector space. As a result, the operations in the vector space are applicable to graph data. In this paper, we propose a new algorithm to detect anomaly for graph data. Firstly, we use graph kernel to define the similarity of the graphs, and then we convert graph data into vector data. After that, we use the Kernel Principal Component Analysis (KPCA) to reduce the dimension, and then train these data by one-class classifier to get the model for anomaly detection. The experiments on datasets MUTAG and ENZYMES at the end of the paper show the efficiency of proposed algorithm","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128734793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure Cloud Container: Runtime Behavior Monitoring Using Most Privileged Container (MPC) 安全云容器:使用最特权容器(MPC)进行运行时行为监控
Vivek Vijay Sarkale, P. Rad, Wonjun Lee
Hypervisor-based virtualization rapidly becomes a commodity, and it turns valuable in many scenarios such as resource optimization, uptime maximization, and consolidation. Container-based application virtualization is an appropriate solution to develop a light weighted partitioning by providing application isolation with less overhead. Undoubtedly, container based virtualization delivers a lightweight and efficient environment, however raises some security concerns as it allows isolated processes to utilize an underlying host kernel. A new security layer with the Most Privileged Container (MPC) is proposed in this article. The proposed MPC layer exhibits three main functional blocks: Access policies, Black list database, and Runtime monitoring. The introduced MPC layer implements privilege based access control and assigns resource access permissions based on policies and the security profiles of containerized application user processes. Furthermore, the monitoring block examines the runtime behavior of containers and black list database is updated if the container violets its policies. The proposed MPC layer provides higher level of application container security against potential threats.
基于管理程序的虚拟化迅速成为一种商品,它在资源优化、正常运行时间最大化和整合等许多场景中变得很有价值。基于容器的应用程序虚拟化是开发轻量级分区的合适解决方案,它提供了开销较小的应用程序隔离。毫无疑问,基于容器的虚拟化提供了一个轻量级和高效的环境,但是也引起了一些安全问题,因为它允许孤立的进程利用底层主机内核。本文提出了一种新的具有最特权容器(MPC)的安全层。提议的MPC层展示了三个主要功能块:访问策略、黑名单数据库和运行时监控。引入的MPC层实现了基于特权的访问控制,并根据策略和容器化应用程序用户进程的安全配置文件分配资源访问权限。此外,监视块检查容器的运行时行为,如果容器违反其策略,则更新黑名单数据库。提议的MPC层提供了更高级别的应用程序容器安全性,以抵御潜在的威胁。
{"title":"Secure Cloud Container: Runtime Behavior Monitoring Using Most Privileged Container (MPC)","authors":"Vivek Vijay Sarkale, P. Rad, Wonjun Lee","doi":"10.1109/CSCloud.2017.68","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.68","url":null,"abstract":"Hypervisor-based virtualization rapidly becomes a commodity, and it turns valuable in many scenarios such as resource optimization, uptime maximization, and consolidation. Container-based application virtualization is an appropriate solution to develop a light weighted partitioning by providing application isolation with less overhead. Undoubtedly, container based virtualization delivers a lightweight and efficient environment, however raises some security concerns as it allows isolated processes to utilize an underlying host kernel. A new security layer with the Most Privileged Container (MPC) is proposed in this article. The proposed MPC layer exhibits three main functional blocks: Access policies, Black list database, and Runtime monitoring. The introduced MPC layer implements privilege based access control and assigns resource access permissions based on policies and the security profiles of containerized application user processes. Furthermore, the monitoring block examines the runtime behavior of containers and black list database is updated if the container violets its policies. The proposed MPC layer provides higher level of application container security against potential threats.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129033612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An Improved Replica Placement Policy for Hadoop Distributed File System Running on Cloud Platforms 云平台上运行Hadoop分布式文件系统的改进副本放置策略
Wei Dai, Ibrahim Adel Ibrahim, M. Bassiouni
Load balance is a crucial issue for data-intensive computing on cloud platforms, because a load balanced cluster can significantly improve the completion time of data-intensive jobs. In this paper, we present an improved replica placement policy for Hadoop Distributed File System (HDFS), which is specifically designed for heterogeneous clusters. The HDFS replica placement policy cannot generate balanced replica assignment, and hence has to rely on a load balance utility to balance the load among cluster nodes. In contrast, our proposed policy can generate perfectly even replica assignment, and also achieve load balance among cluster nodes in any heterogeneous or homogeneous environments without the running of the load balance utility.
对于云平台上的数据密集型计算来说,负载均衡是一个至关重要的问题,因为负载均衡的集群可以显著提高数据密集型作业的完成时间。在本文中,我们提出了一种改进的Hadoop分布式文件系统(HDFS)的副本放置策略,它是专门为异构集群设计的。HDFS副本放置策略不能生成均衡的副本分配,因此必须依赖于负载平衡实用程序来平衡集群节点之间的负载。相比之下,我们提出的策略可以生成完全均匀的副本分配,并且还可以在任何异构或同构环境中实现集群节点之间的负载平衡,而无需运行负载平衡实用程序。
{"title":"An Improved Replica Placement Policy for Hadoop Distributed File System Running on Cloud Platforms","authors":"Wei Dai, Ibrahim Adel Ibrahim, M. Bassiouni","doi":"10.1109/CSCloud.2017.65","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.65","url":null,"abstract":"Load balance is a crucial issue for data-intensive computing on cloud platforms, because a load balanced cluster can significantly improve the completion time of data-intensive jobs. In this paper, we present an improved replica placement policy for Hadoop Distributed File System (HDFS), which is specifically designed for heterogeneous clusters. The HDFS replica placement policy cannot generate balanced replica assignment, and hence has to rely on a load balance utility to balance the load among cluster nodes. In contrast, our proposed policy can generate perfectly even replica assignment, and also achieve load balance among cluster nodes in any heterogeneous or homogeneous environments without the running of the load balance utility.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126051119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
An Overview of Wireless Network Security 无线网络安全概述
Alireza Kavianpour, Michael C. Anderson
While assuming the role of Chief Security Officer, Network Security Designer, and Network Security Administrator, the intention of this research was to identify principle elements related to network security and provide an overview of potential threats, vulnerabilities, and countermeasures associated with technology designed to the IEEE 802.11 wireless LAN standard. In addition, fundamental security requirements are discussed and access control principles were included to address future trends in wireless network security.
在担任首席安全官、网络安全设计师和网络安全管理员的角色时,本研究的目的是确定与网络安全相关的主要要素,并概述与IEEE 802.11无线局域网标准设计的技术相关的潜在威胁、漏洞和对策。此外,还讨论了基本的安全要求,并包括访问控制原则,以解决无线网络安全的未来趋势。
{"title":"An Overview of Wireless Network Security","authors":"Alireza Kavianpour, Michael C. Anderson","doi":"10.1109/CSCloud.2017.45","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.45","url":null,"abstract":"While assuming the role of Chief Security Officer, Network Security Designer, and Network Security Administrator, the intention of this research was to identify principle elements related to network security and provide an overview of potential threats, vulnerabilities, and countermeasures associated with technology designed to the IEEE 802.11 wireless LAN standard. In addition, fundamental security requirements are discussed and access control principles were included to address future trends in wireless network security.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126708820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
IoT Eye An Efficient System for Dynamic IoT Devices Auto-discovery on Organization Level 物联网之眼:组织级动态物联网设备自动发现的高效系统
Jie Shen, Ying Li, B. Li, Hanteng Chen, Jianxin Li
Internet of Things (IoT) serves not only as an essential part of the new generation information technology but as an important development stage in the information era. IoT devices such as unmanned aerial vehicles, robots and wearable equipments have been widely used in recent years. For most organizations' inner networks, innumerable dynamic connections with Internet accessible IoT devices occur at many parts all the time. It is usually these temporal links that arise potential threats to the security of the whole intranet. In this paper, we propose a new system named IoT Eye, which automatically discovers the IoT devices in real time. The IoT Eye detects all the potential IoT target hosts using an innovative two-stage architecture: (1) Scanning suspicious IP segments with stateless TCP SYN scan model and zero copy TCP stack; (2) Identifying each IoT device on various protocols using PI-AC, which is a novel high-performance multi-pattern matching algorithm. The preceding model ensures the IoT Eye searching each newly connected device out in rather small time delay, which minimizes the missing and wrong detection rates. Related intelligence on the active IoT devices linked with the organization's intranets are of great importance to the professionals. Since it can help them: (1) re-examine the borders of large intranets; (2) reduce non-essential device access; (3) fix security vulnerabilities timely.
物联网(Internet of Things, IoT)是新一代信息技术的重要组成部分,也是信息时代的重要发展阶段。近年来,无人机、机器人、可穿戴设备等物联网设备得到了广泛应用。对于大多数组织的内部网络来说,与互联网可访问的物联网设备的无数动态连接每时每刻都在许多地方发生。通常是这些临时链接对整个内部网的安全产生潜在的威胁。在本文中,我们提出了一个名为“物联网之眼”的新系统,该系统可以实时自动发现物联网设备。物联网之眼使用创新的两阶段架构检测所有潜在的物联网目标主机:(1)使用无状态TCP SYN扫描模型和零复制TCP堆栈扫描可疑IP段;(2)使用PI-AC识别各种协议上的每个物联网设备,这是一种新型的高性能多模式匹配算法。上述模型确保物联网之眼在相当小的时间延迟内搜索到每个新连接的设备,从而最大限度地减少丢失和错误的检测率。与组织内部网相连的活动物联网设备上的相关智能对专业人员来说非常重要。因为它可以帮助他们:(1)重新检查大型内部网的边界;(2)减少非必要设备接入;(3)及时修复安全漏洞。
{"title":"IoT Eye An Efficient System for Dynamic IoT Devices Auto-discovery on Organization Level","authors":"Jie Shen, Ying Li, B. Li, Hanteng Chen, Jianxin Li","doi":"10.1109/CSCloud.2017.66","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.66","url":null,"abstract":"Internet of Things (IoT) serves not only as an essential part of the new generation information technology but as an important development stage in the information era. IoT devices such as unmanned aerial vehicles, robots and wearable equipments have been widely used in recent years. For most organizations' inner networks, innumerable dynamic connections with Internet accessible IoT devices occur at many parts all the time. It is usually these temporal links that arise potential threats to the security of the whole intranet. In this paper, we propose a new system named IoT Eye, which automatically discovers the IoT devices in real time. The IoT Eye detects all the potential IoT target hosts using an innovative two-stage architecture: (1) Scanning suspicious IP segments with stateless TCP SYN scan model and zero copy TCP stack; (2) Identifying each IoT device on various protocols using PI-AC, which is a novel high-performance multi-pattern matching algorithm. The preceding model ensures the IoT Eye searching each newly connected device out in rather small time delay, which minimizes the missing and wrong detection rates. Related intelligence on the active IoT devices linked with the organization's intranets are of great importance to the professionals. Since it can help them: (1) re-examine the borders of large intranets; (2) reduce non-essential device access; (3) fix security vulnerabilities timely.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122647639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Event Detection with Multivariate Water Parameters in the Water Monitoring Applications 多变量水参数在水监测应用中的事件检测
Yingchi Mao, Hai Qi, Xiaoli Chen, Xiaofang Li
The real-time time series data of multiple water quality parameters are obtained from the water sensor networks deployed in the water supply network. The accurate and efficient detection and warning of contamination events to prevent pollution from spreading is one of the most important issues when the pollution occurs. In order to comprehensively reduce the event detection deviation, a Temporal Abnormal Event Detection Algorithm for Multivariate time series data (M-TAEDA) was proposed. In M-TAEDA, first, Back Propagation neural network models are adopted to analyze the time series data of multiple water quality parameters and calculate the possible outliers. Then, M-TAEDA algorithm determines the potential contamination events through Bayesian sequential analysis to estimate the probability of a contamination event. Finally, it can make decision based on the multiple event probabilities fusion in the water supply system. The experimental results indicate that the proposed M-TAEDA algorithm can obtain the 90% accuracy with BP neural network model and improve the rate of detection about 40% and reduce the false alarm rate about 45%, compared with the temporal event detection of Single Variate Temporal Abnormal Event Detection Algorithm (S-TAEDA).
从供水网络中部署的水浸传感器网络中获取多个水质参数的实时时间序列数据。准确、高效地检测和预警污染事件,防止污染扩散,是污染发生时最重要的问题之一。为了全面降低事件检测偏差,提出了一种多变量时间序列数据时间异常事件检测算法(M-TAEDA)。在M-TAEDA中,首先采用Back Propagation神经网络模型对多个水质参数的时间序列数据进行分析,并计算可能的异常值。然后,M-TAEDA算法通过贝叶斯序列分析确定潜在污染事件,估计污染事件发生的概率。最后,基于供水系统的多事件概率融合进行决策。实验结果表明,与单变量时间异常事件检测算法(S-TAEDA)的时间事件检测相比,本文提出的M-TAEDA算法与BP神经网络模型相比,准确率达到90%,检出率提高约40%,虚警率降低约45%。
{"title":"Event Detection with Multivariate Water Parameters in the Water Monitoring Applications","authors":"Yingchi Mao, Hai Qi, Xiaoli Chen, Xiaofang Li","doi":"10.1109/CSCloud.2017.67","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.67","url":null,"abstract":"The real-time time series data of multiple water quality parameters are obtained from the water sensor networks deployed in the water supply network. The accurate and efficient detection and warning of contamination events to prevent pollution from spreading is one of the most important issues when the pollution occurs. In order to comprehensively reduce the event detection deviation, a Temporal Abnormal Event Detection Algorithm for Multivariate time series data (M-TAEDA) was proposed. In M-TAEDA, first, Back Propagation neural network models are adopted to analyze the time series data of multiple water quality parameters and calculate the possible outliers. Then, M-TAEDA algorithm determines the potential contamination events through Bayesian sequential analysis to estimate the probability of a contamination event. Finally, it can make decision based on the multiple event probabilities fusion in the water supply system. The experimental results indicate that the proposed M-TAEDA algorithm can obtain the 90% accuracy with BP neural network model and improve the rate of detection about 40% and reduce the false alarm rate about 45%, compared with the temporal event detection of Single Variate Temporal Abnormal Event Detection Algorithm (S-TAEDA).","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116699292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Cloud-Based Service Delivery Platform for Effective Homeland Security 基于云的高效国土安全服务交付平台
P. Chelliah, S. Kumar
The discipline of Homeland Security is gaining wider traction especially after the horrendous attack on the world trade center, the USA in 2001. Recently national governments are very seriously and sincerely putting a lot of emphasis and efforts on national security aspects that implicitly cover the safety and security of people, infrastructures, and resources. It is overwhelmingly acknowledged that Information and Communication Technology (ICT) is the best fit and the route for effectively scavenging, sensitizing and securing the various mission and life-critical sources and resources of the continents, countries, counties, and cities. In this paper, we would like to insist how the emerging and evolving concept of cloud computing will effectively safeguard and seal the security of nations and their occupants, constituents, and participants. In this paper, we have contributed with a description of homeland security services that can be designed, built and hosted on public clouds. We have designed a flexible framework for the cloud–based service development, deployment, and delivery platform, especially for homeland security. As services are being implemented in the cloud environment, the availability and accessibility get comprehensively easy and ensured for worldwide developers to come out with better, leaner, and adaptive homeland security applications.
特别是在2001年美国世贸中心遭受恐怖袭击之后,国土安全学科得到了更广泛的关注。最近,各国政府非常认真和真诚地强调和努力国家安全方面,这隐含地涵盖了人员,基础设施和资源的安全和保障。绝大多数人都承认,信息和通信技术(ICT)是最适合的,也是有效地收集、敏感化和保护各大洲、国家、县和城市的各种任务和生命关键资源和资源的途径。在本文中,我们想坚持新兴和不断发展的云计算概念将如何有效地保护和密封国家及其居住者、组成部分和参与者的安全。在本文中,我们描述了可以在公共云上设计、构建和托管的国土安全服务。我们为基于云的服务开发、部署和交付平台,特别是国土安全,设计了一个灵活的框架。随着服务在云环境中实现,可用性和可访问性变得非常容易,并确保全球开发人员能够开发出更好、更精简和自适应的国土安全应用程序。
{"title":"A Cloud-Based Service Delivery Platform for Effective Homeland Security","authors":"P. Chelliah, S. Kumar","doi":"10.1109/CSCloud.2017.16","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.16","url":null,"abstract":"The discipline of Homeland Security is gaining wider traction especially after the horrendous attack on the world trade center, the USA in 2001. Recently national governments are very seriously and sincerely putting a lot of emphasis and efforts on national security aspects that implicitly cover the safety and security of people, infrastructures, and resources. It is overwhelmingly acknowledged that Information and Communication Technology (ICT) is the best fit and the route for effectively scavenging, sensitizing and securing the various mission and life-critical sources and resources of the continents, countries, counties, and cities. In this paper, we would like to insist how the emerging and evolving concept of cloud computing will effectively safeguard and seal the security of nations and their occupants, constituents, and participants. In this paper, we have contributed with a description of homeland security services that can be designed, built and hosted on public clouds. We have designed a flexible framework for the cloud–based service development, deployment, and delivery platform, especially for homeland security. As services are being implemented in the cloud environment, the availability and accessibility get comprehensively easy and ensured for worldwide developers to come out with better, leaner, and adaptive homeland security applications.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132736064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Power Control Weakness in Long Term Evolution Network 长期演化网络中的功率控制弱点
Weilian Su, Too Huseh Tien, T. Ha
The increasingly important role of Long Term Evolution (LTE) has increased security concerns among the service provider and end users and made security of the network even more indispensable. In this paper, the power control mechanism for LTE is explored. The unprotected power control signal together with the Cell Radio Network Temporary Identifier (CRNTI) can be exploited to trick the victim User Equipment (UE) to transmit at a much higher than required power, which introduces significant inter-cell interference to the adjacent based station, evolved NodeB (eNodeB). The ways that an attacker can maliciously manipulate the control field of the power control mechanism are demonstrated. The effectiveness of such attack is evaluated with respect to the victim UEs and the adjacent eNodeB.
长期演进技术(LTE)日益重要的作用增加了服务提供商和最终用户对网络安全的关注,使网络安全变得更加不可或缺。本文对LTE的功率控制机制进行了探讨。未受保护的功率控制信号与小区无线网络临时标识符(CRNTI)一起可以被利用来欺骗受害者用户设备(UE)以远高于所需功率的速度传输,这将对相邻的基站(演变为NodeB (eNodeB))引入显着的小区间干扰。演示了攻击者恶意操纵功率控制机制控制字段的方法。这种攻击的有效性是相对于受害者ue和相邻的eNodeB进行评估的。
{"title":"Power Control Weakness in Long Term Evolution Network","authors":"Weilian Su, Too Huseh Tien, T. Ha","doi":"10.1109/CSCloud.2017.33","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.33","url":null,"abstract":"The increasingly important role of Long Term Evolution (LTE) has increased security concerns among the service provider and end users and made security of the network even more indispensable. In this paper, the power control mechanism for LTE is explored. The unprotected power control signal together with the Cell Radio Network Temporary Identifier (CRNTI) can be exploited to trick the victim User Equipment (UE) to transmit at a much higher than required power, which introduces significant inter-cell interference to the adjacent based station, evolved NodeB (eNodeB). The ways that an attacker can maliciously manipulate the control field of the power control mechanism are demonstrated. The effectiveness of such attack is evaluated with respect to the victim UEs and the adjacent eNodeB.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127637779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning for Anomaly Detection and Categorization in Multi-Cloud Environments 多云环境下异常检测与分类的机器学习
Tara Salman, D. Bhamare, A. Erbad, R. Jain, M. Samaka
Cloud computing has been widely adopted by application service providers (ASPs) and enterprises to reduce both capital expenditures (CAPEX) and operational expenditures (OPEX). Applications and services previously running on private data centers are now being migrated to private or public clouds. Since most of the ASPs and enterprises have globally distributed user bases, their services need to be distributed across multiple clouds, spread across the globe which can achieve better performance in terms of latency, scalability and load balancing. The shift has eventually led the research community to study multi-cloud environments. However, the widespread acceptance of such environments has been hampered by major security concerns. Firewalls and traditional rule-based security protection techniques are not sufficient to protect user-data in multi-cloud scenarios. Recently, advances in machine learning techniques have attracted the attention of the research community to build intrusion detection systems (IDS) that can detect anomalies in the network traffic. Most of the research works, however, do not differentiate among different types of attacks. This is, in fact, necessary for appropriate countermeasures and defense against attacks. In this paper, we investigate both detecting and categorizing anomalies rather than just detecting, which is a common trend in the contemporary research works. We have used a popular publicly available dataset to build and test learning models for both detection and categorization of different attacks. To be precise, we have used two supervised machine learning techniques, namely linear regression (LR) and random forest (RF). We show that even if detection is perfect, categorization can be less accurate due to similarities between attacks. Our results demonstrate more than 99% detection accuracy and categorization accuracy of 93.6%, with the inability to categorize some attacks. Further, we argue that such categorization can be applied to multi-cloud environments using the same machine learning techniques.
云计算已被应用服务提供商(asp)和企业广泛采用,以降低资本支出(CAPEX)和运营支出(OPEX)。以前在私有数据中心上运行的应用程序和服务现在正在迁移到私有或公共云。由于大多数asp和企业拥有全球分布的用户群,因此他们的服务需要分布在多个云上,在全球范围内传播,这样可以在延迟、可伸缩性和负载平衡方面实现更好的性能。这种转变最终导致研究界开始研究多云环境。然而,这种环境的广泛接受受到重大安全问题的阻碍。防火墙和传统的基于规则的安全保护技术不足以保护多云场景中的用户数据。近年来,机器学习技术的进步引起了研究界对构建入侵检测系统(IDS)的关注,该系统可以检测网络流量中的异常。然而,大多数研究工作并没有区分不同类型的攻击。事实上,这对于适当的对策和防御攻击是必要的。在本文中,我们研究了异常的检测和分类,而不仅仅是检测,这是当代研究工作的共同趋势。我们使用了一个流行的公开可用数据集来构建和测试用于检测和分类不同攻击的学习模型。准确地说,我们使用了两种监督式机器学习技术,即线性回归(LR)和随机森林(RF)。我们表明,即使检测是完美的,由于攻击之间的相似性,分类也可能不太准确。我们的结果表明,检测准确率超过99%,分类准确率为93.6%,但无法对某些攻击进行分类。此外,我们认为这种分类可以使用相同的机器学习技术应用于多云环境。
{"title":"Machine Learning for Anomaly Detection and Categorization in Multi-Cloud Environments","authors":"Tara Salman, D. Bhamare, A. Erbad, R. Jain, M. Samaka","doi":"10.1109/CSCloud.2017.15","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.15","url":null,"abstract":"Cloud computing has been widely adopted by application service providers (ASPs) and enterprises to reduce both capital expenditures (CAPEX) and operational expenditures (OPEX). Applications and services previously running on private data centers are now being migrated to private or public clouds. Since most of the ASPs and enterprises have globally distributed user bases, their services need to be distributed across multiple clouds, spread across the globe which can achieve better performance in terms of latency, scalability and load balancing. The shift has eventually led the research community to study multi-cloud environments. However, the widespread acceptance of such environments has been hampered by major security concerns. Firewalls and traditional rule-based security protection techniques are not sufficient to protect user-data in multi-cloud scenarios. Recently, advances in machine learning techniques have attracted the attention of the research community to build intrusion detection systems (IDS) that can detect anomalies in the network traffic. Most of the research works, however, do not differentiate among different types of attacks. This is, in fact, necessary for appropriate countermeasures and defense against attacks. In this paper, we investigate both detecting and categorizing anomalies rather than just detecting, which is a common trend in the contemporary research works. We have used a popular publicly available dataset to build and test learning models for both detection and categorization of different attacks. To be precise, we have used two supervised machine learning techniques, namely linear regression (LR) and random forest (RF). We show that even if detection is perfect, categorization can be less accurate due to similarities between attacks. Our results demonstrate more than 99% detection accuracy and categorization accuracy of 93.6%, with the inability to categorize some attacks. Further, we argue that such categorization can be applied to multi-cloud environments using the same machine learning techniques.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"2018 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114498354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 74
A Highly-Secure Self-Protection Data Scheme in Clouds Using Active Data Bundles and Agent-Based Secure Multi-party Computation 基于活动数据包和基于代理的安全多方计算的云环境中高度安全的自我保护数据方案
Akram Y. Sarhan, S. Carr
Protection of data in cloud computing is a critical problem for many enterprises. We propose a solution that protects sensitive data outsourced to a cloud throughout their entire life cycle—both in the cloud as well as outside of the cloud (e.g., during transmission to or from the cloud). Our solution, known as Active Data Bundles using Secure Multi-Party Computation (ADB-SMC), uses: (i) active data bundles (ADBs)—for self-protecting data; (ii) ciphertext-policy attribute-based encryption—for fine-grained access control; and, (iii) threshold RSA—for secure key management. We describe components and design of ADB-SMC and present the pseudocode for creating ADB to outsource data to the cloud. We implemented a prototype of the solution and compared its overhead with the overhead of the approach known as Active Bundles with Trusted Third Party (ABTTP). The results of performance tests show that the execution time overhead for ADBSMC is acceptable.
云计算中的数据保护是许多企业面临的关键问题。我们提出了一种解决方案,可以保护外包给云的敏感数据在其整个生命周期中——无论是在云中还是在云之外(例如,在向云传输或从云传输的过程中)。我们的解决方案,被称为使用安全多方计算(ADB-SMC)的活动数据包,使用:(i)活动数据包(adb) -用于自我保护数据;(ii)密文策略基于属性的加密——用于细粒度访问控制;(iii)阈值rsa——用于安全密钥管理。我们描述了ADB- smc的组件和设计,并提供了创建ADB以将数据外包到云的伪代码。我们实现了该解决方案的原型,并将其开销与称为具有可信第三方的活动包(ABTTP)的方法的开销进行了比较。性能测试结果表明,ADBSMC的执行时间开销是可以接受的。
{"title":"A Highly-Secure Self-Protection Data Scheme in Clouds Using Active Data Bundles and Agent-Based Secure Multi-party Computation","authors":"Akram Y. Sarhan, S. Carr","doi":"10.1109/CSCloud.2017.36","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.36","url":null,"abstract":"Protection of data in cloud computing is a critical problem for many enterprises. We propose a solution that protects sensitive data outsourced to a cloud throughout their entire life cycle—both in the cloud as well as outside of the cloud (e.g., during transmission to or from the cloud). Our solution, known as Active Data Bundles using Secure Multi-Party Computation (ADB-SMC), uses: (i) active data bundles (ADBs)—for self-protecting data; (ii) ciphertext-policy attribute-based encryption—for fine-grained access control; and, (iii) threshold RSA—for secure key management. We describe components and design of ADB-SMC and present the pseudocode for creating ADB to outsource data to the cloud. We implemented a prototype of the solution and compared its overhead with the overhead of the approach known as Active Bundles with Trusted Third Party (ABTTP). The results of performance tests show that the execution time overhead for ADBSMC is acceptable.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129089306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
期刊
2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1