首页 > 最新文献

ISC Int. J. Inf. Secur.最新文献

英文 中文
Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications 用于宽阻带衰减应用的悬式带状低通滤波器设计
Pub Date : 2020-11-01 DOI: 10.22042/isecure.2021.271055.613
Aymen M. Al-Kadhimi, Salim A. Mohammed Ali, S. Hasan
This paper involves the design of asymmetrical generalized Chebyshev low-pass filter realized with a suspended substrate stripline. The study presents the synthesis and design of an asymmetrical prototype with a degree of 11, the cut-off frequency of 2.5 GHz, better than 26 dB as passband return loss and a broad stopband rejection of 55 dB. The filter produces 11 transmission zeros (attenuation poles), one at infinity and 5 pairs located at finite frequencies offering better wide stopband attenuation performance as well as sharp selectivity. The filter is built based on suspended stripline structure (SSS) using aluminium as a cavity and with 2mm as a ground spacing. The filter measurements show a reasonable agreement has been achieved with the simulated response.An eleventh-order lowpass filter satisfying generalized Chebyshev response with asymmetrical topology, a wide stopband rejection and high selectivity has been presented. The filter has a total of 11 TZs, one is located at infinity and 5 pairs located at different finite frequencies contributing response improvements in both passband and stopband re- gions
本文设计了一种用悬底带状线实现的非对称广义切比雪夫低通滤波器。本研究提出了一种非对称样机的合成与设计,该样机的度为11,截止频率为2.5 GHz,通带回波损耗优于26 dB,宽阻带抑制为55 dB。该滤波器产生11个传输零(衰减极点),一个在无限和5对位于有限频率,提供更好的宽阻带衰减性能以及锐利的选择性。该滤波器基于悬浮带状线结构(SSS),使用铝作为空腔,接地间距为2mm。滤波器的测量结果与仿真结果符合较好。提出了一种具有非对称拓扑、宽阻带抑制和高选择性、满足广义切比雪夫响应的11阶低通滤波器。该滤波器共有11个TZs,一个位于无穷远处,5对位于不同的有限频率处,有助于提高通带和阻带区域的响应
{"title":"Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications","authors":"Aymen M. Al-Kadhimi, Salim A. Mohammed Ali, S. Hasan","doi":"10.22042/isecure.2021.271055.613","DOIUrl":"https://doi.org/10.22042/isecure.2021.271055.613","url":null,"abstract":"This paper involves the design of asymmetrical generalized Chebyshev low-pass filter realized with a suspended substrate stripline. The study presents the synthesis and design of an asymmetrical prototype with a degree of 11, the cut-off frequency of 2.5 GHz, better than 26 dB as passband return loss and a broad stopband rejection of 55 dB. The filter produces 11 transmission zeros (attenuation poles), one at infinity and 5 pairs located at finite frequencies offering better wide stopband attenuation performance as well as sharp selectivity. The filter is built based on suspended stripline structure (SSS) using aluminium as a cavity and with 2mm as a ground spacing. The filter measurements show a reasonable agreement has been achieved with the simulated response.An eleventh-order lowpass filter satisfying generalized Chebyshev response with asymmetrical topology, a wide stopband rejection and high selectivity has been presented. The filter has a total of 11 TZs, one is located at infinity and 5 pairs located at different finite frequencies contributing response improvements in both passband and stopband re- gions","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128801607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery 基于消息恢复的高效无配对身份代理盲签名方案
Pub Date : 2020-10-06 DOI: 10.22042/ISECURE.2020.208473.495
Salome James, T. Gowri, P. V. Reddy
In recent years, due to their potential applications, proxy blind signatures became an active research topic and are an extension of the basic proxy signature. A proxy blind signature scheme enables a proxy signer to produce a blind signature on behalf of an original signer. Such schemes are useful in many practical applications such as e-commerce, e-voting, e-tendering systems. Many proxy blind signature schemes have been proposed in the literature. In order to improve the efficiency and to adopt resource constrained devices, in this paper, we propose a pairing free ID-based proxy blind signature scheme with message recovery. The proposed scheme is proven secure against the random oracle model under the hardness assumption of the elliptic curve discrete logarithm problem. We compare our scheme with the other proxy blind signature schemes. The efficiency analysis shows that our scheme is more efficient in terms of computational and communicational point of view. Also due to the message recovery property, our scheme can be deployed easily in low band width devices.
代理盲签名是对基本代理签名的扩展,近年来由于其潜在的应用前景而成为一个活跃的研究课题。代理盲签名方案允许代理签名人代表原始签名人生成盲签名。这些方案在许多实际应用中都很有用,例如电子商务、电子投票、电子投标系统。文献中提出了许多代理盲签名方案。为了提高效率和利用资源受限的设备,本文提出了一种带消息恢复的基于无配对id的代理盲签名方案。在椭圆曲线离散对数问题的硬度假设下,证明了该方案对随机oracle模型是安全的。并将该方案与其他代理盲签名方案进行了比较。效率分析表明,该方案在计算和通信方面都具有更高的效率。此外,由于消息恢复特性,我们的方案可以很容易地部署在低带宽设备中。
{"title":"An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery","authors":"Salome James, T. Gowri, P. V. Reddy","doi":"10.22042/ISECURE.2020.208473.495","DOIUrl":"https://doi.org/10.22042/ISECURE.2020.208473.495","url":null,"abstract":"In recent years, due to their potential applications, proxy blind signatures became an active research topic and are an extension of the basic proxy signature. A proxy blind signature scheme enables a proxy signer to produce a blind signature on behalf of an original signer. Such schemes are useful in many practical applications such as e-commerce, e-voting, e-tendering systems. Many proxy blind signature schemes have been proposed in the literature. In order to improve the efficiency and to adopt resource constrained devices, in this paper, we propose a pairing free ID-based proxy blind signature scheme with message recovery. The proposed scheme is proven secure against the random oracle model under the hardness assumption of the elliptic curve discrete logarithm problem. We compare our scheme with the other proxy blind signature schemes. The efficiency analysis shows that our scheme is more efficient in terms of computational and communicational point of view. Also due to the message recovery property, our scheme can be deployed easily in low band width devices.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129030020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Use of Local Sensitive Hashing for E-learner Face Identification 局部敏感哈希法在在线学习者人脸识别中的应用
Pub Date : 2020-08-30 DOI: 10.22042/ISECURE.2021.271051.612
Hachem H. Alaoui, El-Kaber Hachem, C. Ziti, Mohammed Karim
Because face can reveal so much hidden information, we need to interpret these data and benefit from them. Hence, our paper shows a new and productive facial image representation based on local sensitive hashing (LSH). This strategy makes it conceivable to recognize the students who pursue their preparation in our learning training; during every session, an image of the learner will be taken by the webcam to be compared to that already stored in the database. As soon as the learner is recognized, he/she must be arranged in the accordion to an appropriate profile that takes into consideration his/her weaknesses and strength, which is conducted with the help of the J48 as a predictive study. Furthermore, we utilize a light processing module on the client device with a compact code in order that we can have a lot of in formation transmission capable to send the component over the network and to have the option to record many photos in an enormous database in the cloud.
因为人脸可以揭示很多隐藏的信息,我们需要解读这些数据并从中受益。因此,本文提出了一种新的基于局部敏感哈希(LSH)的高效面部图像表示方法。这一策略使得在我们的学习训练中识别那些追求准备的学生成为可能;在每次学习过程中,网络摄像头都会拍摄学习者的图像,并将其与数据库中已经存储的图像进行比较。一旦学习者被识别出来,就必须考虑到他/她的弱点和优势,将他/她按手风琴排列成适当的轮廓,这是在J48的帮助下进行的,作为一项预测性研究。此外,我们利用客户端设备上的光处理模块和紧凑的代码,以便我们可以有大量的信息传输,能够通过网络发送组件,并可以选择在云中的庞大数据库中记录许多照片。
{"title":"The Use of Local Sensitive Hashing for E-learner Face Identification","authors":"Hachem H. Alaoui, El-Kaber Hachem, C. Ziti, Mohammed Karim","doi":"10.22042/ISECURE.2021.271051.612","DOIUrl":"https://doi.org/10.22042/ISECURE.2021.271051.612","url":null,"abstract":"Because face can reveal so much hidden information, we need to interpret these data and benefit from them. Hence, our paper shows a new and productive facial image representation based on local sensitive hashing (LSH). This strategy makes it conceivable to recognize the students who pursue their preparation in our learning training; during every session, an image of the learner will be taken by the webcam to be compared to that already stored in the database. As soon as the learner is recognized, he/she must be arranged in the accordion to an appropriate profile that takes into consideration his/her weaknesses and strength, which is conducted with the help of the J48 as a predictive study. Furthermore, we utilize a light processing module on the client device with a compact code in order that we can have a lot of in formation transmission capable to send the component over the network and to have the option to record many photos in an enormous database in the cloud.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129371925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking COLM认证密码的CPA及面向域掩蔽保护
Pub Date : 2020-07-01 DOI: 10.22042/ISECURE.2020.191916.471
M. Jahanbani, N. Bagheri, Zynolabedin Norouzi
Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical implementation of any other cryptographic scheme. In this paper, a three-step CPA attack against COLM, one of the winners of CAESAR, is presented to indicate its vulnerability. To validate this attack, COLM is implemented on the FPGA of the SAKURA-G board. A successful CPA attack with zero value power model is mounted by measuring and collecting 1,800 power traces. In addition, a protected hardware architecture for COLM is proposed to make this design secure against first-order CPA attacks, where a domain-oriented masking (DOM) scheme with two-input/output shares is used to protect it. To verify these countermeasures, we mount first and second-order CPA attacks and a non-specified t-test on the protected COLM. Keywords: Authenticated Cipher, COLM, CPA, DOM, Masking.
身份验证加密方案是近年来受到广泛关注的重要加密原语。他们可以同时提供保密和真实性服务。相关功率分析(CPA)可以作为经过身份验证的密码的线程,类似于任何其他加密方案的任何物理实现。本文提出了一种针对CAESAR赢家之一COLM的三步CPA攻击方法,以说明其脆弱性。为了验证这种攻击,COLM在SAKURA-G板的FPGA上实现。通过测量和收集1800个功率走线,成功实现了零值功率模型的CPA攻击。此外,提出了COLM的受保护硬件架构,使该设计免受一阶CPA攻击,其中使用了双输入/输出共享的面向域掩蔽(DOM)方案来保护它。为了验证这些对策,我们对受保护的COLM进行了一级和二级CPA攻击和非指定t检验。关键词:认证密码,COLM, CPA, DOM,屏蔽。
{"title":"CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking","authors":"M. Jahanbani, N. Bagheri, Zynolabedin Norouzi","doi":"10.22042/ISECURE.2020.191916.471","DOIUrl":"https://doi.org/10.22042/ISECURE.2020.191916.471","url":null,"abstract":"Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical implementation of any other cryptographic scheme. In this paper, a three-step CPA attack against COLM, one of the winners of CAESAR, is presented to indicate its vulnerability. To validate this attack, COLM is implemented on the FPGA of the SAKURA-G board. A successful CPA attack with zero value power model is mounted by measuring and collecting 1,800 power traces. In addition, a protected hardware architecture for COLM is proposed to make this design secure against first-order CPA attacks, where a domain-oriented masking (DOM) scheme with two-input/output shares is used to protect it. To verify these countermeasures, we mount first and second-order CPA attacks and a non-specified t-test on the protected COLM. Keywords: Authenticated Cipher, COLM, CPA, DOM, Masking.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121049493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions 一种基于非齐次线性递推的快速公开可验证秘密共享方案
Pub Date : 2020-07-01 DOI: 10.22042/ISECURE.2020.212763.505
A. Zaghian, Bagher Bagherpour
A non-interactive (t,n)-publicly veri able secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS schemes have found a lot of applications in cryptography because they are suitable for real-life scenarios in which an external verifier is required to check the correctness of the produced shares without interacting with the dealer and participants. In this paper, we propose a non-interactive (t,n)-PVSS scheme using the non-homogeneous linear recursions (NHLRs), and prove its security with a formal method. We compare the computational complexity of our scheme with that of Schoenmakers's scheme and show that our non-interactive (t,n)-PVSS scheme runs faster than Schoenmakers's scheme when n > 5 and n> t >(2n+9)/n. The communicational complexity of our scheme is almost equal to that of Schoenmakers's scheme.
非交互式(t,n)-可公开验证的秘密共享方案(非交互式(t,n)-PVSS方案)是一种(t,n)-秘密共享方案,其中任何人,不仅是方案的参与者,都可以在不与经销商和参与者交互的情况下验证生成的股份的正确性。(t,n)-PVSS方案在密码学中有很多应用,因为它们适用于需要外部验证者检查产生的股份的正确性而无需与经销商和参与者交互的现实场景。本文利用非齐次线性递推(NHLRs)提出了一种非交互(t,n)-PVSS方案,并用形式化方法证明了其安全性。我们比较了该方案与Schoenmakers方案的计算复杂度,表明当n> 5和n> t >(2n+9)/n时,我们的非交互(t,n)-PVSS方案比Schoenmakers方案运行速度更快。该方案的通信复杂度几乎等于舍恩梅克方案的通信复杂度。
{"title":"A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions","authors":"A. Zaghian, Bagher Bagherpour","doi":"10.22042/ISECURE.2020.212763.505","DOIUrl":"https://doi.org/10.22042/ISECURE.2020.212763.505","url":null,"abstract":"A non-interactive (t,n)-publicly veri able secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS schemes have found a lot of applications in cryptography because they are suitable for real-life scenarios in which an external verifier is required to check the correctness of the produced shares without interacting with the dealer and participants. In this paper, we propose a non-interactive (t,n)-PVSS scheme using the non-homogeneous linear recursions (NHLRs), and prove its security with a formal method. We compare the computational complexity of our scheme with that of Schoenmakers's scheme and show that our non-interactive (t,n)-PVSS scheme runs faster than Schoenmakers's scheme when n > 5 and n> t >(2n+9)/n. The communicational complexity of our scheme is almost equal to that of Schoenmakers's scheme.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132100686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enhanced Flush+Reload Attack on AES 增强了AES的Flush+Reload攻击
Pub Date : 2020-07-01 DOI: 10.22042/ISECURE.2020.219248.519
Milad Seddigh, H. Soleimany
In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used in the crypto libraries like OpenSSL. Several Flush+Reload attacks on T-table implementation of AES have been proposed in the literature which requires a notable number of encryptions. In this paper, we present a technique to enhance the Flush+Reload attack on AES in the ciphertext-only scenario by significantly reducing the number of needed encryptions in both native and cross-VM setups. In this paper, we focus on finding the wrong key candidates and keep the right key by considering only the cache miss event. Our attack is faster than previous Flush+Reload attacks. In particular, our method can speed-up the Flush+Reload attack in cross-VM environment significantly. To verify the theoretical model, we implemented the proposed attack.
在云计算中,多个用户可以共享可能泄露机密信息的同一台物理机器,特别是在启用内存重复数据删除功能时。Flush+Reload攻击是一种利用资源共享的基于缓存的攻击。AES的t表实现通常用于像OpenSSL这样的加密库。文献中已经提出了几种针对AES的t表实现的Flush+Reload攻击,这些攻击需要大量的加密。在本文中,我们提出了一种技术,通过显着减少本机和跨虚拟机设置中所需的加密数量,来增强仅密文场景中对AES的Flush+Reload攻击。在本文中,我们主要通过只考虑缓存丢失事件来寻找错误的候选键并保留正确的键。我们的攻击比以前的同花齐放攻击更快。特别是,我们的方法可以显著加快跨虚拟机环境下的Flush+Reload攻击。为了验证理论模型,我们实现了所提出的攻击。
{"title":"Enhanced Flush+Reload Attack on AES","authors":"Milad Seddigh, H. Soleimany","doi":"10.22042/ISECURE.2020.219248.519","DOIUrl":"https://doi.org/10.22042/ISECURE.2020.219248.519","url":null,"abstract":"In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used in the crypto libraries like OpenSSL. Several Flush+Reload attacks on T-table implementation of AES have been proposed in the literature which requires a notable number of encryptions. In this paper, we present a technique to enhance the Flush+Reload attack on AES in the ciphertext-only scenario by significantly reducing the number of needed encryptions in both native and cross-VM setups. In this paper, we focus on finding the wrong key candidates and keep the right key by considering only the cache miss event. Our attack is faster than previous Flush+Reload attacks. In particular, our method can speed-up the Flush+Reload attack in cross-VM environment significantly. To verify the theoretical model, we implemented the proposed attack.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131622295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management F-STONE:一种基于改进历史内存管理的快速实时DDOS攻击检测方法
Pub Date : 2020-07-01 DOI: 10.22042/ISECURE.2020.167450.453
Mahsa Nooribakhsh, M. Mollamotalebi
Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the proposed method attempts to detect it, is the most common type of DDoS attacks. The aim of this paper is to reduce the delay of real-time detection of DDoS attacks utilizing hybrid structures based on data stream algorithms. The proposed data structure (BHM ) improves the data storing mechanism presented in STONE method and consequently reduces the detection time. STONE characterizes regular network traffic of a service by aggregating it into common prefixes of IP addresses, and detecting attacks when the aggregated traffic deviates from the regular one. In BHM, history refers to the output traffic information obtained from each monitoring period to form a reference profile. The reference profile is created by employing historical information and only includes normal traffic information. The delay of DDoS attack detection increases in STONE due to long-time intervals between each monitoring period. The proposed method (F-STONE) has been compared to STONE based on attack detection time, Expected Profile Update Time (EPUT), and rate of attack detection. The evaluation results indicated significant improvements in terms of the EPUT, acceleration of attack detection and reduction of false positive rate.
分布式拒绝服务攻击(Distributed Denial of Service, DDoS)是近年来常见的一种攻击方式,它通过大量发送报文来耗尽受害节点的带宽。根据攻击的流量类型、流量大小以及被攻击对象利用的漏洞,DDoS攻击可以分为容量攻击、协议攻击和应用攻击三种类型。容量攻击是最常见的DDoS攻击类型,本文提出的方法试图检测容量攻击。本文的目的是利用基于数据流算法的混合结构来减少DDoS攻击实时检测的延迟。所提出的数据结构(BHM)改进了STONE方法的数据存储机制,从而缩短了检测时间。STONE通过将业务的正常网络流量聚合成共同的IP地址前缀,并在聚合后的流量偏离正常时检测攻击行为,从而将业务的正常网络流量特征化。在BHM中,历史是指从每个监控周期中获得的输出流量信息,以形成参考配置文件。引用配置文件是利用历史信息创建的,只包含正常的流量信息。在STONE中,由于每个监控周期间隔较长,DDoS攻击检测的延迟会增加。基于攻击检测时间、预期配置文件更新时间(EPUT)和攻击检测率,将本文提出的方法(F-STONE)与STONE进行比较。评价结果表明,该方法在EPUT、攻击检测加速和误报率降低等方面均有显著提高。
{"title":"F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management","authors":"Mahsa Nooribakhsh, M. Mollamotalebi","doi":"10.22042/ISECURE.2020.167450.453","DOIUrl":"https://doi.org/10.22042/ISECURE.2020.167450.453","url":null,"abstract":"Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the proposed method attempts to detect it, is the most common type of DDoS attacks. The aim of this paper is to reduce the delay of real-time detection of DDoS attacks utilizing hybrid structures based on data stream algorithms. The proposed data structure (BHM ) improves the data storing mechanism presented in STONE method and consequently reduces the detection time. STONE characterizes regular network traffic of a service by aggregating it into common prefixes of IP addresses, and detecting attacks when the aggregated traffic deviates from the regular one. In BHM, history refers to the output traffic information obtained from each monitoring period to form a reference profile. The reference profile is created by employing historical information and only includes normal traffic information. The delay of DDoS attack detection increases in STONE due to long-time intervals between each monitoring period. The proposed method (F-STONE) has been compared to STONE based on attack detection time, Expected Profile Update Time (EPUT), and rate of attack detection. The evaluation results indicated significant improvements in terms of the EPUT, acceleration of attack detection and reduction of false positive rate.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132962181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems 基于云的电子健康记录(EHR)系统基于属性的访问控制
Pub Date : 2020-05-31 DOI: 10.22042/ISECURE.2020.174338.458
Maryam Zarezadeh, M. Ashouri-Talouki, Mohammad Siavashi
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records in a cloud system. In their scheme, encrypted EHRs are stored in multiple clouds to provide scalability and privacy. In addition, they considered a role-based access control (RBAC) such that for any user, an EHR access policy must be determined. They also encrypt the EHRs by the public keys of all users. So, for a large amount of EHRs, this scheme is not efficient. Furthermore, using RBAC for access policy makes the policy changing difficult. In their scheme, users cannot search on encrypted EHRs based on diseases and some physicians must participate in the data retrieval by a requester physician. In this paper, we address these problems by considering a ciphertext-policy attribute-based encryption (CP-ABE) which is conceptually closer to the traditional access control methods such as RBAC. Our secure scheme can retrieve encrypted EHR based on a specific disease. Furthermore, the proposed scheme guarantees the user access control and the anonymity of the user or data owner during data retrieval. Moreover, our scheme is resistant against collusion between unauthorized retrievers to access the data. The analysis shows that our scheme is secure and efficient for cloud-based EHRs.
电子健康档案(EHR)系统有助于整合患者的医疗信息,提高服务效率。然而,用户以保护隐私的方式访问患者数据仍然是一个具有挑战性的问题。许多研究都关注电子病历系统的安全性和隐私性。Rezaeibagha和Mu[1]提出了一种混合架构,用于在云系统中访问隐私保护的患者记录。在他们的方案中,加密的电子病历存储在多个云中,以提供可伸缩性和隐私。此外,他们还考虑了基于角色的访问控制(RBAC),以便为任何用户确定EHR访问策略。他们还使用所有用户的公钥对电子病历进行加密。因此,对于大量的电子病历,该方案效率不高。此外,对访问策略使用RBAC使策略更改变得困难。在他们的方案中,用户不能根据疾病搜索加密的电子病历,一些医生必须参与请求医生的数据检索。在本文中,我们通过考虑基于密文策略属性的加密(CP-ABE)来解决这些问题,该加密在概念上更接近于传统的访问控制方法,如RBAC。我们的安全方案可以根据特定疾病检索加密的电子病历。此外,该方案在数据检索过程中保证了用户访问控制和用户或数据所有者的匿名性。此外,我们的方案可以防止未经授权的检索者之间串通访问数据。分析表明,该方案对于基于云的电子病历来说是安全高效的。
{"title":"Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems","authors":"Maryam Zarezadeh, M. Ashouri-Talouki, Mohammad Siavashi","doi":"10.22042/ISECURE.2020.174338.458","DOIUrl":"https://doi.org/10.22042/ISECURE.2020.174338.458","url":null,"abstract":"Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records in a cloud system. In their scheme, encrypted EHRs are stored in multiple clouds to provide scalability and privacy. In addition, they considered a role-based access control (RBAC) such that for any user, an EHR access policy must be determined. They also encrypt the EHRs by the public keys of all users. So, for a large amount of EHRs, this scheme is not efficient. Furthermore, using RBAC for access policy makes the policy changing difficult. In their scheme, users cannot search on encrypted EHRs based on diseases and some physicians must participate in the data retrieval by a requester physician. In this paper, we address these problems by considering a ciphertext-policy attribute-based encryption (CP-ABE) which is conceptually closer to the traditional access control methods such as RBAC. Our secure scheme can retrieve encrypted EHR based on a specific disease. Furthermore, the proposed scheme guarantees the user access control and the anonymity of the user or data owner during data retrieval. Moreover, our scheme is resistant against collusion between unauthorized retrievers to access the data. The analysis shows that our scheme is secure and efficient for cloud-based EHRs.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132201203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism 基于异常的Web攻击检测:基于注意力机制的深度神经网络Seq2Seq的应用
Pub Date : 2020-01-01 DOI: 10.22042/isecure.2020.199009.479
S. Mohammadi, A. Namadchian
Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in detecting new attacks. To tackle this problem, various methods of machine learning have been presented in recent years. Since malicious web requests have more delicate distinction than normal requests, these methods have failed to exhibit a good accuracy in new attack detection. This paper presents a new method for web attack detection using seq2seq networks using attention. The results show that this method could predict the possible responses and use the difference from the real responses of the server to model the normal traffic. Thereby, it could use the similarity measure to discriminate between normal and anomalous traffic. The highest accuracy of this method versus similar methods shows that the use of attention mechanism can cope with the challenge of studying long web requests to a great extent.
如今,互联网和互联网网站的使用已经成为人们生活中不可或缺的一部分,而大多数活动和重要数据都在互联网网站中。因此,入侵这些网站的企图呈指数级增长。针对web攻击的入侵检测系统(IDS)是保护用户安全的一种手段。但是,这些系统存在检测新攻击的准确性低等缺点。为了解决这个问题,近年来出现了各种各样的机器学习方法。由于恶意web请求比正常请求具有更微妙的区别,这些方法在新攻击检测中未能表现出良好的准确性。提出了一种基于注意力的seq2seq网络的web攻击检测新方法。结果表明,该方法可以预测可能的响应,并利用与服务器实际响应的差异来模拟正常流量。因此,它可以使用相似度量来区分正常和异常的流量。与同类方法相比,该方法的最高准确率表明,使用注意机制可以在很大程度上应对长网页请求研究的挑战。
{"title":"Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism","authors":"S. Mohammadi, A. Namadchian","doi":"10.22042/isecure.2020.199009.479","DOIUrl":"https://doi.org/10.22042/isecure.2020.199009.479","url":null,"abstract":"Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in detecting new attacks. To tackle this problem, various methods of machine learning have been presented in recent years. Since malicious web requests have more delicate distinction than normal requests, these methods have failed to exhibit a good accuracy in new attack detection. This paper presents a new method for web attack detection using seq2seq networks using attention. The results show that this method could predict the possible responses and use the difference from the real responses of the server to model the normal traffic. Thereby, it could use the similarity measure to discriminate between normal and anomalous traffic. The highest accuracy of this method versus similar methods shows that the use of attention mechanism can cope with the challenge of studying long web requests to a great extent.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128937860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices 数据包跟踪器在学习无线网络和管理物联网设备中的作用
Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.5
R. Flifel
Wireless networks, Internet of Things (IoT), Internet of Everything (IoE), and smart homes have become extremely important terms in our present-day life. Most of the buildings, companies, institutions, and even homes depend onthese technologies for interaction, communication, automation, and everything surrounding humans. To understand the advanced topics in wireless networks and IoT devices, it is necessary to use one of the practical learning tools, calledPacket Tracer. This wireless network simulator is freely available by Cisco Networking Academy. In this paper, we will use Packet Tracer to design a smart home based on wireless and IoT devices and illustrate how to create different networking scenarios to make our homes more comfortable and convenient.
无线网络、物联网(IoT)、万物互联(IoE)和智能家居已经成为我们当今生活中极其重要的术语。大多数建筑、公司、机构甚至家庭都依赖于这些技术来进行交互、通信、自动化以及人类周围的一切。要了解无线网络和物联网设备中的高级主题,有必要使用一种实用的学习工具,称为packet Tracer。这个无线网络模拟器由思科网络学院免费提供。在本文中,我们将使用Packet Tracer来设计一个基于无线和物联网设备的智能家居,并说明如何创建不同的网络场景,让我们的家庭更加舒适和方便。
{"title":"The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices","authors":"R. Flifel","doi":"10.22042/ISECURE.2019.11.0.5","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.5","url":null,"abstract":"Wireless networks, Internet of Things (IoT), Internet of Everything (IoE), and smart homes have become extremely important terms in our present-day life. Most of the buildings, companies, institutions, and even homes depend onthese technologies for interaction, communication, automation, and everything surrounding humans. To understand the advanced topics in wireless networks and IoT devices, it is necessary to use one of the practical learning tools, calledPacket Tracer. This wireless network simulator is freely available by Cisco Networking Academy. In this paper, we will use Packet Tracer to design a smart home based on wireless and IoT devices and illustrate how to create different networking scenarios to make our homes more comfortable and convenient.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134176447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
ISC Int. J. Inf. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1