首页 > 最新文献

2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)最新文献

英文 中文
Security Analysis of Email Systems 电子邮件系统安全分析
Tianlin Li, Amish Mehta, Ping Yang
Electronic mail (email) is universally used by businesses, government agencies, and individual users. Out of necessity, users trust their email systems to keep their emails safe and secure. However, email systems are often complex and exhaustive testing is almost impossible for such systems. As a result, email systems often contain bugs and security vulnerabilities. In this paper, we analyze the security and usability of five popular public email systems. Our analysis shows that there are several security vulnerabilities in multiple sign-in and password composition and recovery policy of some of the email systems.
电子邮件(email)被企业、政府机构和个人用户普遍使用。出于必要,用户相信他们的电子邮件系统可以保证他们的电子邮件的安全。然而,电子邮件系统通常是复杂的,对这样的系统进行详尽的测试几乎是不可能的。因此,电子邮件系统经常包含错误和安全漏洞。在本文中,我们分析了五种流行的公共邮件系统的安全性和可用性。我们的分析表明,部分电子邮件系统的多重登录和密码组合及恢复策略存在多个安全漏洞。
{"title":"Security Analysis of Email Systems","authors":"Tianlin Li, Amish Mehta, Ping Yang","doi":"10.1109/CSCloud.2017.20","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.20","url":null,"abstract":"Electronic mail (email) is universally used by businesses, government agencies, and individual users. Out of necessity, users trust their email systems to keep their emails safe and secure. However, email systems are often complex and exhaustive testing is almost impossible for such systems. As a result, email systems often contain bugs and security vulnerabilities. In this paper, we analyze the security and usability of five popular public email systems. Our analysis shows that there are several security vulnerabilities in multiple sign-in and password composition and recovery policy of some of the email systems.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"37 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133021380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Privacy-Preserving and Secure Recommender System Enhance with K-NN and Social Tagging 基于K-NN和社会标签的隐私保护和安全推荐系统
R. Katarya, O. Verma
With the introduction of Web 2.0, there has been an extreme increase in the popularity of social bookmarking systems and folksonomies. In this paper, our motive is to develop a recommender system that is based on user assigned tags and content present on web pages. Although the tag recommendations in social tagging systems can be very accurate and personalized, there exists an issue of risk to the privacy of user's profile, since the social tags are given by a user expose his preferences to other users in contact. To overcome this problem, we have incorporated obfuscation privacy strategies with the well-known Delicious dataset in social tagging based recommender system. We have applied the popular supervised machine-learning algorithm, K-Nearest Neighbours classifier to the dataset that recommends relevant tags to the user. Privacy has been introduced in our tag-based recommender system by hiding some of the necessary tags, bookmarks of a user and replacing them with some random tags and bookmarks. Our experiment results indicate that the recommender system being implemented is highly efficient in terms recall and privacy measure for different values of k. The results and comparisons indicate that we have successfully employed an effective tag recommender system, which also protects the user's privacy without any significant fall in the quality of recommendation.
随着Web 2.0的引入,社会书签系统和大众分类法的流行程度急剧增加。在本文中,我们的动机是开发一个基于用户分配的标签和网页上呈现的内容的推荐系统。虽然社会标签系统中的标签推荐可以非常准确和个性化,但存在用户个人资料隐私风险的问题,因为社会标签是由用户提供的,会将他的偏好暴露给接触的其他用户。为了克服这个问题,我们将混淆隐私策略与著名的Delicious数据集结合在基于社交标签的推荐系统中。我们将流行的监督机器学习算法——k近邻分类器应用于向用户推荐相关标签的数据集。我们在基于标签的推荐系统中引入了隐私,隐藏了用户的一些必要的标签和书签,并用一些随机的标签和书签代替它们。我们的实验结果表明,所实现的推荐系统在不同k值的召回率和隐私措施方面都是高效的。结果和比较表明,我们成功地采用了一种有效的标签推荐系统,在保护用户隐私的同时,推荐质量没有明显下降。
{"title":"Privacy-Preserving and Secure Recommender System Enhance with K-NN and Social Tagging","authors":"R. Katarya, O. Verma","doi":"10.1109/CSCloud.2017.24","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.24","url":null,"abstract":"With the introduction of Web 2.0, there has been an extreme increase in the popularity of social bookmarking systems and folksonomies. In this paper, our motive is to develop a recommender system that is based on user assigned tags and content present on web pages. Although the tag recommendations in social tagging systems can be very accurate and personalized, there exists an issue of risk to the privacy of user's profile, since the social tags are given by a user expose his preferences to other users in contact. To overcome this problem, we have incorporated obfuscation privacy strategies with the well-known Delicious dataset in social tagging based recommender system. We have applied the popular supervised machine-learning algorithm, K-Nearest Neighbours classifier to the dataset that recommends relevant tags to the user. Privacy has been introduced in our tag-based recommender system by hiding some of the necessary tags, bookmarks of a user and replacing them with some random tags and bookmarks. Our experiment results indicate that the recommender system being implemented is highly efficient in terms recall and privacy measure for different values of k. The results and comparisons indicate that we have successfully employed an effective tag recommender system, which also protects the user's privacy without any significant fall in the quality of recommendation.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133319131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Family Relationship Inference Using Knights Landing Platform 基于骑士登陆平台的家庭关系推断
Yuxiang Gao, Wei-Min Chen
Using genetic data to infer relatedness has been crucial for genetics studies for decades. In a previously published paper together with the KING software, we demonstrated that the kinship coefficient, a measure of relatedness between a pair of individuals, can be accurately estimated using their genome-wide SNP data, without estimating the allele frequencies at each SNP in the whole dataset. The computational efficiency of this algorithm has been substantially improved in the second generation of KING. Three levels of computational speed-up are implemented in KING 2.0, including: 1) bit-level parallelism; 2) multiple-core parallelism using OpenMP; and 3) a multi-stage procedure to eliminate unrelated or distantly related pairs of individuals. The efficient implementation in KING 2.0 allows instant relationship inference in a matter of seconds in a typical dataset (with 10,000s individuals). To demonstrate the computational performance and scalability of KING 2.0, we use the Knights Landing platform to infer relatedness in a dataset consisting of 303,750 individuals each typed at 168,749 autosome SNPs. The computational time to identify all first-degree relatives by scanning 46 billion pairs of individuals is ∼10 minutes using 256 threads, a noticeable speed-up comparing to the general-purpose CPU. Algorithm improvement in the second generation of KING and the use of the latest computing system such as the Knights Landing platform makes it feasible for researchers to infer relatedness in their genetic datasets in the largest size up-to-date on a single computer.
几十年来,利用基因数据推断亲缘关系一直是遗传学研究的关键。在之前与KING软件一起发表的一篇论文中,我们证明了亲属关系系数(一对个体之间的亲缘关系的度量)可以使用他们的全基因组SNP数据准确估计,而无需估计整个数据集中每个SNP的等位基因频率。在第二代KING中,该算法的计算效率得到了大幅提高。KING 2.0实现了三个级别的计算加速,包括:1)位级并行;2)使用OpenMP实现多核并行;3)一个多阶段的程序,以消除不相关或远亲对个体。KING 2.0中的高效实现允许在几秒钟内对典型数据集(包含10,000个个体)进行即时关系推断。为了展示KING 2.0的计算性能和可扩展性,我们使用Knights Landing平台在一个由303,750个个体组成的数据集中推断相关性,每个个体都有168,749个常染色体snp。通过扫描460亿对个体来识别所有一级亲属的计算时间为256个线程,大约10分钟,与通用CPU相比,速度明显提高。第二代KING算法的改进和骑士登陆平台等最新计算系统的使用,使研究人员能够在一台计算机上以最大的规模推断其遗传数据集的相关性。
{"title":"Family Relationship Inference Using Knights Landing Platform","authors":"Yuxiang Gao, Wei-Min Chen","doi":"10.1109/CSCloud.2017.41","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.41","url":null,"abstract":"Using genetic data to infer relatedness has been crucial for genetics studies for decades. In a previously published paper together with the KING software, we demonstrated that the kinship coefficient, a measure of relatedness between a pair of individuals, can be accurately estimated using their genome-wide SNP data, without estimating the allele frequencies at each SNP in the whole dataset. The computational efficiency of this algorithm has been substantially improved in the second generation of KING. Three levels of computational speed-up are implemented in KING 2.0, including: 1) bit-level parallelism; 2) multiple-core parallelism using OpenMP; and 3) a multi-stage procedure to eliminate unrelated or distantly related pairs of individuals. The efficient implementation in KING 2.0 allows instant relationship inference in a matter of seconds in a typical dataset (with 10,000s individuals). To demonstrate the computational performance and scalability of KING 2.0, we use the Knights Landing platform to infer relatedness in a dataset consisting of 303,750 individuals each typed at 168,749 autosome SNPs. The computational time to identify all first-degree relatives by scanning 46 billion pairs of individuals is ∼10 minutes using 256 threads, a noticeable speed-up comparing to the general-purpose CPU. Algorithm improvement in the second generation of KING and the use of the latest computing system such as the Knights Landing platform makes it feasible for researchers to infer relatedness in their genetic datasets in the largest size up-to-date on a single computer.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130794659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Power and Performance Study of HPC Applications on QCT Developer Cloud 基于QCT开发者云的高性能计算应用功耗与性能研究
P. Young, Probha Madhavan, Gong-Do Hwang
We present direct performance measurement for eight popular HPC applications on the Knights Landing (KNL) platform. Performance numbers for Haswell processors are provided for contrast. The applications (DGEMM. SGEMM, STREAM, IOR, HPCG, Quantum Espresso, WRF and HPL) were selected from among the ten most used in the QCT developer cloud as well as good representative of workloads used by large number of users and, given their diversity, should be representative of typical HPC workloads. All runs were performed with publicly available codes without modification and so results should be expected to improve as developers gain access to KNL. Current results are promising, with execution on a single KNL processor showing speedups up to 1.7x with respect to a dual socket Haswell.
我们在骑士登陆(KNL)平台上对八种流行的高性能计算应用程序进行了直接的性能测量。提供了Haswell处理器的性能数据进行对比。应用程序(DGEMM)。SGEMM、STREAM、IOR、HPCG、Quantum Espresso、WRF和HPL)是从QCT开发人员云中使用最多的十个工作负载中选出的,它们很好地代表了大量用户使用的工作负载,考虑到它们的多样性,它们应该是典型HPC工作负载的代表。所有运行都是在没有修改的情况下使用公开可用的代码执行的,因此随着开发人员访问KNL,结果应该会有所改善。目前的结果很有希望,在单个KNL处理器上的执行速度比双插槽Haswell提高了1.7倍。
{"title":"Power and Performance Study of HPC Applications on QCT Developer Cloud","authors":"P. Young, Probha Madhavan, Gong-Do Hwang","doi":"10.1109/CSCloud.2017.50","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.50","url":null,"abstract":"We present direct performance measurement for eight popular HPC applications on the Knights Landing (KNL) platform. Performance numbers for Haswell processors are provided for contrast. The applications (DGEMM. SGEMM, STREAM, IOR, HPCG, Quantum Espresso, WRF and HPL) were selected from among the ten most used in the QCT developer cloud as well as good representative of workloads used by large number of users and, given their diversity, should be representative of typical HPC workloads. All runs were performed with publicly available codes without modification and so results should be expected to improve as developers gain access to KNL. Current results are promising, with execution on a single KNL processor showing speedups up to 1.7x with respect to a dual socket Haswell.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"527 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123903161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
End-to-End IoT Security Middleware for Cloud-Fog Communication 云雾通信的端到端物联网安全中间件
B. Mukherjee, R. Neupane, P. Calyam
IoT (Internet of Things) devices such as sensors have been actively used in 'fogs' to provide critical data during e.g., disaster response scenarios or in-home healthcare. Since IoT devices typically operate in resource-constrained computing environments at the network-edge, data transfer performance to the cloud as well as end-to-end security have to be robust and customizable. In this paper, we present the design and implementation of a middleware featuring "intermittent" and "flexible" end-to-end security for cloud-fog communications. Intermittent security copes with unreliable network connections, and flexibility is achieved through security configurations that are tailored to application needs. Our experiment results show how our middleware that leverages static pre-shared keys forms a promising solution for delivering light-weight, fast and resource-aware security for a variety of IoT-based applications.
传感器等物联网(IoT)设备已被积极用于“雾”中,以在灾难响应场景或家庭医疗保健期间提供关键数据。由于物联网设备通常在网络边缘资源受限的计算环境中运行,因此向云的数据传输性能以及端到端安全性必须是强大且可定制的。在本文中,我们提出了一种中间件的设计和实现,该中间件具有“间歇”和“灵活”的云雾通信端到端安全性。间歇性安全性可以应对不可靠的网络连接,并且通过根据应用程序需求量身定制的安全配置来实现灵活性。我们的实验结果表明,我们的中间件利用静态预共享密钥形成了一个有前途的解决方案,为各种基于物联网的应用程序提供轻量级、快速和资源感知的安全性。
{"title":"End-to-End IoT Security Middleware for Cloud-Fog Communication","authors":"B. Mukherjee, R. Neupane, P. Calyam","doi":"10.1109/CSCloud.2017.62","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.62","url":null,"abstract":"IoT (Internet of Things) devices such as sensors have been actively used in 'fogs' to provide critical data during e.g., disaster response scenarios or in-home healthcare. Since IoT devices typically operate in resource-constrained computing environments at the network-edge, data transfer performance to the cloud as well as end-to-end security have to be robust and customizable. In this paper, we present the design and implementation of a middleware featuring \"intermittent\" and \"flexible\" end-to-end security for cloud-fog communications. Intermittent security copes with unreliable network connections, and flexibility is achieved through security configurations that are tailored to application needs. Our experiment results show how our middleware that leverages static pre-shared keys forms a promising solution for delivering light-weight, fast and resource-aware security for a variety of IoT-based applications.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116455679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
mPSI: Many-to-one Private Set Intersection mPSI:多对一私有集合交集
Keji Hu, Wensheng Zhang
In this paper, we first define a new security problem, named mPSI (many-to-one private set interaction), which can find applications in many scenarios where the host of a big database may be queried by a large number of clients who have small-size queries and want to prevent both the intentions and results of their queries from being exposed to others. We also propose a new scheme to solve the mPSI problem. The scheme extends the state-of-the-art oblivious transfer-based one-to-one PSI schemes, but also embeds the innovative ideas of (1) leveraging the collaborations between clients to achieve high computational and communication efficiency, and (2) relying on server-aided secret encryption to hide each client's private information from being exposed to either the server or any other client. Extensive theoretical analysis and experiments have been conducted to evaluate the proposed scheme and compare the scheme with the state of the art, and the results verify the security and efficiency of our proposed scheme.
在本文中,我们首先定义了一个新的安全问题,称为mPSI(多对一私有集交互),它可以在许多场景中找到应用程序,在这些场景中,大型数据库的主机可能被大量具有小型查询的客户端查询,并且希望防止其查询的意图和结果被暴露给其他人。我们还提出了一种解决mPSI问题的新方案。该方案扩展了最先进的基于不经意传输的一对一PSI方案,但也嵌入了以下创新思想:(1)利用客户端之间的协作来实现高计算和通信效率;(2)依靠服务器辅助的秘密加密来隐藏每个客户端的私有信息,使其不会暴露给服务器或任何其他客户端。进行了大量的理论分析和实验,对所提出的方案进行了评价,并与目前的方案进行了比较,结果验证了所提出方案的安全性和有效性。
{"title":"mPSI: Many-to-one Private Set Intersection","authors":"Keji Hu, Wensheng Zhang","doi":"10.1109/CSCloud.2017.35","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.35","url":null,"abstract":"In this paper, we first define a new security problem, named mPSI (many-to-one private set interaction), which can find applications in many scenarios where the host of a big database may be queried by a large number of clients who have small-size queries and want to prevent both the intentions and results of their queries from being exposed to others. We also propose a new scheme to solve the mPSI problem. The scheme extends the state-of-the-art oblivious transfer-based one-to-one PSI schemes, but also embeds the innovative ideas of (1) leveraging the collaborations between clients to achieve high computational and communication efficiency, and (2) relying on server-aided secret encryption to hide each client's private information from being exposed to either the server or any other client. Extensive theoretical analysis and experiments have been conducted to evaluate the proposed scheme and compare the scheme with the state of the art, and the results verify the security and efficiency of our proposed scheme.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123786864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Email Visualization Correlation Analysis Forensics Research 电子邮件可视化关联分析取证研究
Zhenya Chen, Ying Yang, Lijuan Chen, Liqiang Wen, Jizhi Wang, Guang Yang, Meng Guo
Foxmail client is one of the most popular tools to send and receive e-mail, and the mail data files preserved in it become an important target of computer investigation and forensics, from which the useful clues can be mined out and analyzed. In this paper, a visual Foxmail forensics system is designed to extract the information from the mail evidence file and display the association between the contacts by graphic and search the mail body and the attachment by full-text retrieval. The system can assist the investigating and forensic officers to analyze the correlation between the sender and the receiver, and find some useful clues to provide the necessary reference for handling the cases.
Foxmail客户端是最流行的电子邮件收发工具之一,其中保存的邮件数据文件成为计算机调查和取证的重要目标,从中可以挖掘和分析有用的线索。本文设计了一个可视化的Foxmail取证系统,从邮件证据文件中提取信息,通过图形化的方式显示联系人之间的关联,通过全文检索的方式搜索邮件正文和附件。该系统可以协助侦查人员和鉴证人员分析寄件人和收件人之间的关系,并从中找到一些有用的线索,为办案提供必要的参考。
{"title":"Email Visualization Correlation Analysis Forensics Research","authors":"Zhenya Chen, Ying Yang, Lijuan Chen, Liqiang Wen, Jizhi Wang, Guang Yang, Meng Guo","doi":"10.1109/CSCloud.2017.28","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.28","url":null,"abstract":"Foxmail client is one of the most popular tools to send and receive e-mail, and the mail data files preserved in it become an important target of computer investigation and forensics, from which the useful clues can be mined out and analyzed. In this paper, a visual Foxmail forensics system is designed to extract the information from the mail evidence file and display the association between the contacts by graphic and search the mail body and the attachment by full-text retrieval. The system can assist the investigating and forensic officers to analyze the correlation between the sender and the receiver, and find some useful clues to provide the necessary reference for handling the cases.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124565737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design of Virtualization Framework to Detect Cyber Threats in Linux Environment Linux环境下网络威胁检测的虚拟化框架设计
D. Levy, Hardik A. Gohel, Himanshu Upadhyay, A. Perez-Pons, Leonel E. Lagos
In today's software and systems environments, security frameworks and models are evolving exponentially. Many traditional host-based frameworks are currently available to detect cyber threats in Linux environment. But there have been many challenges in detecting rootkits that modify the Linux Operating System (OS) kernel to avoid detection. These limitations have lead us to design a virtualization framework for detection of cyber threats in Linux environment. Instead of relying on the Linux Operating System kernel which is now a common victim of cyber-attacks, this virtualization framework will rely on the virtual machine hypervisor which is a more secure software layer that runs the OS kernel and the hardware. The paper proposed a virtualization framework based on well-known hypervisors, to detect cyber threats. The proposed work allowed for a more robust cyber threat detection method than traditional host-based frameworks. It can also possess self-healing properties since it will not only detect compromised servers but also suspend their operation by replacing them with uncompromised versions. This innovative framework promises to secure large scale IT infrastructure with minimum maintenance cost.
在当今的软件和系统环境中,安全框架和模型呈指数级发展。目前有许多传统的基于主机的框架可用于检测Linux环境下的网络威胁。但是,在检测修改Linux操作系统(OS)内核以避免检测的rootkit方面存在许多挑战。这些限制促使我们设计了一个虚拟化框架来检测Linux环境下的网络威胁。而不是依赖于Linux操作系统内核,现在是网络攻击的常见受害者,这个虚拟化框架将依赖于虚拟机管理程序,这是一个更安全的软件层,运行操作系统内核和硬件。本文提出了一种基于知名管理程序的虚拟化框架来检测网络威胁。提出的工作允许比传统的基于主机的框架更健壮的网络威胁检测方法。它还具有自我修复特性,因为它不仅可以检测受感染的服务器,还可以通过用未受感染的版本替换它们来暂停它们的操作。这个创新的框架承诺以最低的维护成本保护大规模的IT基础设施。
{"title":"Design of Virtualization Framework to Detect Cyber Threats in Linux Environment","authors":"D. Levy, Hardik A. Gohel, Himanshu Upadhyay, A. Perez-Pons, Leonel E. Lagos","doi":"10.1109/CSCloud.2017.18","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.18","url":null,"abstract":"In today's software and systems environments, security frameworks and models are evolving exponentially. Many traditional host-based frameworks are currently available to detect cyber threats in Linux environment. But there have been many challenges in detecting rootkits that modify the Linux Operating System (OS) kernel to avoid detection. These limitations have lead us to design a virtualization framework for detection of cyber threats in Linux environment. Instead of relying on the Linux Operating System kernel which is now a common victim of cyber-attacks, this virtualization framework will rely on the virtual machine hypervisor which is a more secure software layer that runs the OS kernel and the hardware. The paper proposed a virtualization framework based on well-known hypervisors, to detect cyber threats. The proposed work allowed for a more robust cyber threat detection method than traditional host-based frameworks. It can also possess self-healing properties since it will not only detect compromised servers but also suspend their operation by replacing them with uncompromised versions. This innovative framework promises to secure large scale IT infrastructure with minimum maintenance cost.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114264374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Network Anomaly Detection with Stochastically Improved Autoencoder Based Models 基于随机改进自编码器模型的网络异常检测
R. C. Aygun, A. Yavuz
Intrusion detection systems do not perform well when it comes to detecting zero-day attacks, therefore improving their performance in that regard is an active research topic. In this study, to detect zero-day attacks with high accuracy, we proposed two deep learning based anomaly detection models using autoencoder and denoising autoencoder respectively. The key factor that directly affects the accuracy of the proposed models is the threshold value which was determined using a stochastic approach rather than the approaches available in the current literature. The proposed models were tested using the KDDTest+ dataset contained in NSL-KDD, and we achieved an accuracy of 88.28% and 88.65% respectively. The obtained results show that, as a singular model, our proposed anomaly detection models outperform any other singular anomaly detection methods and they perform almost the same as the newly suggested hybrid anomaly detection models.
入侵检测系统在检测零日攻击方面表现不佳,因此提高其在这方面的性能是一个活跃的研究课题。为了高精度检测零日攻击,我们提出了两种基于深度学习的异常检测模型,分别使用自编码器和去噪自编码器。直接影响所提出模型准确性的关键因素是阈值,该阈值是使用随机方法而不是当前文献中可用的方法确定的。使用NSL-KDD中包含的KDDTest+数据集对所提出的模型进行了测试,准确率分别达到了88.28%和88.65%。结果表明,作为一个奇异模型,我们提出的异常检测模型优于其他奇异异常检测方法,其性能与新提出的混合异常检测模型几乎相同。
{"title":"Network Anomaly Detection with Stochastically Improved Autoencoder Based Models","authors":"R. C. Aygun, A. Yavuz","doi":"10.1109/CSCloud.2017.39","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.39","url":null,"abstract":"Intrusion detection systems do not perform well when it comes to detecting zero-day attacks, therefore improving their performance in that regard is an active research topic. In this study, to detect zero-day attacks with high accuracy, we proposed two deep learning based anomaly detection models using autoencoder and denoising autoencoder respectively. The key factor that directly affects the accuracy of the proposed models is the threshold value which was determined using a stochastic approach rather than the approaches available in the current literature. The proposed models were tested using the KDDTest+ dataset contained in NSL-KDD, and we achieved an accuracy of 88.28% and 88.65% respectively. The obtained results show that, as a singular model, our proposed anomaly detection models outperform any other singular anomaly detection methods and they perform almost the same as the newly suggested hybrid anomaly detection models.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"780 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123284277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 107
Malware Fingerprinting under Uncertainty 不确定性下的恶意软件指纹识别
Krishnendu Ghosh, W. Casey, J. Morales, B. Mishra
Malware detection and classification is critical for the security of IT infrastructure. Legacy detection of malware has been highly reliant on static signatures, so malware authors have evolved code polymorphic techniques to counteract these tools, thus rendering static malware detectors ineffective. While malware writers may easily use code rewriting techniques to scramble binary images; malware processes at runtime still must conduct a sequence of operational steps to achieve its design goal, indicating an approach based on behavioral analysis where the captured invariants form a new type of forensic fingerprint. Moreover these operational steps are constrained to occur within the computers' or mobile devices' abstract system interface - a finite basis of activities that submit to effective monitoring with a variety of tools. In this work, we propose a formalism for expressing these behaviors, learning them and analyzing them to form automated malware analysis tools. Thus motivated by a need to detect and classify malware, we root its foundation in formal verification, as well as methodology from statistical and machine learning. Specifically using trace data from malware we leverage formal verification methods (such as probabilistic model checking) to construct classifiers and evaluate their efficacy in supervised learning and cross-fold validation experiments. The results inform how a fully automated reasoning mechanism may be applied to unknown software by posing its system trace as a query to various classifiers as hypothesis testing, the outputs informing belief of membership. Finally, we demonstrate the method and results on real malware data.
恶意软件的检测和分类对于IT基础设施的安全至关重要。恶意软件的遗留检测一直高度依赖于静态签名,因此恶意软件作者已经发展了代码多态技术来抵消这些工具,从而使静态恶意软件检测器无效。虽然恶意软件编写者可以很容易地使用代码重写技术来打乱二进制图像;恶意软件进程在运行时仍然必须执行一系列操作步骤来实现其设计目标,这表明了一种基于行为分析的方法,其中捕获的不变量形成了一种新型的法医指纹。此外,这些操作步骤被限制在计算机或移动设备的抽象系统接口中发生,这是一个有限的活动基础,需要通过各种工具进行有效的监控。在这项工作中,我们提出了一种表达这些行为、学习它们并分析它们以形成自动化恶意软件分析工具的形式化方法。因此,出于检测和分类恶意软件的需要,我们将其植根于正式验证,以及统计和机器学习的方法。特别是使用恶意软件的跟踪数据,我们利用形式化验证方法(如概率模型检查)来构建分类器并评估其在监督学习和交叉验证实验中的有效性。结果告知了一个完全自动化的推理机制如何通过将其系统跟踪作为对各种分类器的查询作为假设检验来应用于未知软件,输出通知成员的信念。最后,我们在真实的恶意软件数据上展示了方法和结果。
{"title":"Malware Fingerprinting under Uncertainty","authors":"Krishnendu Ghosh, W. Casey, J. Morales, B. Mishra","doi":"10.1109/CSCloud.2017.63","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.63","url":null,"abstract":"Malware detection and classification is critical for the security of IT infrastructure. Legacy detection of malware has been highly reliant on static signatures, so malware authors have evolved code polymorphic techniques to counteract these tools, thus rendering static malware detectors ineffective. While malware writers may easily use code rewriting techniques to scramble binary images; malware processes at runtime still must conduct a sequence of operational steps to achieve its design goal, indicating an approach based on behavioral analysis where the captured invariants form a new type of forensic fingerprint. Moreover these operational steps are constrained to occur within the computers' or mobile devices' abstract system interface - a finite basis of activities that submit to effective monitoring with a variety of tools. In this work, we propose a formalism for expressing these behaviors, learning them and analyzing them to form automated malware analysis tools. Thus motivated by a need to detect and classify malware, we root its foundation in formal verification, as well as methodology from statistical and machine learning. Specifically using trace data from malware we leverage formal verification methods (such as probabilistic model checking) to construct classifiers and evaluate their efficacy in supervised learning and cross-fold validation experiments. The results inform how a fully automated reasoning mechanism may be applied to unknown software by posing its system trace as a query to various classifiers as hypothesis testing, the outputs informing belief of membership. Finally, we demonstrate the method and results on real malware data.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129421526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1