首页 > 最新文献

IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004最新文献

英文 中文
Safety in automated trust negotiation 自动信任协商中的安全性
Pub Date : 2004-05-09 DOI: 10.1145/1178618.1178623
W. Winsborough, Ninghui Li
Exchange of attribute credentials is a means to establish mutual trust between strangers wishing to share resources or conduct business transactions. Automated Trust Negotiation (ATN) is an approach to regulate the exchange of sensitive information during this process. It treats credentials as potentially sensitive resources, access to which is under policy control. Negotiations that correctly enforce policies have been called safe in the literature. Prior work on ATN lacks an adequate definition of this safety notion. In large part, this is because fundamental questions such as what needs to be protected in ATN? and what are the security requirements? are not adequately answered. As a result, many prior methods of ATN have serious security holes. We introduce a formal framework for ATN in which we give precise, usable, and intuitive definitions of correct enforcement of policies in ATN. We argue that our chief safety notion captures intuitive security goals under both possibilistic and probabilistic analysis. We give precise comparisons of this notion with two alternative safety notions that may seem intuitive, but that are seen to be inadequate under closer inspection. We prove that an approach to ATN from the literature meets the requirements set forth in the preferred safety definition, thus validating the safety of that approach, as well as the usability of the definition.
交换属性凭证是希望共享资源或进行业务交易的陌生人之间建立相互信任的一种手段。自动信任协商(Automated Trust Negotiation, ATN)是一种规范在此过程中敏感信息交换的方法。它将凭据视为潜在的敏感资源,其访问受策略控制。在文献中,正确执行政策的谈判被称为安全的。先前关于ATN的工作缺乏对这一安全概念的充分定义。在很大程度上,这是因为一些基本问题,如在ATN中需要保护什么?安全要求是什么?都没有得到充分的回答。因此,许多现有的ATN方法存在严重的安全漏洞。我们为ATN引入了一个正式的框架,在这个框架中,我们给出了ATN中正确执行策略的精确、可用和直观的定义。我们认为,我们的主要安全概念在可能性和概率分析下捕捉了直观的安全目标。我们将这一概念与两种替代的安全概念进行了精确的比较,这两种概念似乎是直观的,但在更仔细的检查下,它们被认为是不够的。我们证明了文献中的ATN方法满足首选安全定义中规定的要求,从而验证了该方法的安全性以及定义的可用性。
{"title":"Safety in automated trust negotiation","authors":"W. Winsborough, Ninghui Li","doi":"10.1145/1178618.1178623","DOIUrl":"https://doi.org/10.1145/1178618.1178623","url":null,"abstract":"Exchange of attribute credentials is a means to establish mutual trust between strangers wishing to share resources or conduct business transactions. Automated Trust Negotiation (ATN) is an approach to regulate the exchange of sensitive information during this process. It treats credentials as potentially sensitive resources, access to which is under policy control. Negotiations that correctly enforce policies have been called safe in the literature. Prior work on ATN lacks an adequate definition of this safety notion. In large part, this is because fundamental questions such as what needs to be protected in ATN? and what are the security requirements? are not adequately answered. As a result, many prior methods of ATN have serious security holes. We introduce a formal framework for ATN in which we give precise, usable, and intuitive definitions of correct enforcement of policies in ATN. We argue that our chief safety notion captures intuitive security goals under both possibilistic and probabilistic analysis. We give precise comparisons of this notion with two alternative safety notions that may seem intuitive, but that are seen to be inadequate under closer inspection. We prove that an approach to ATN from the literature meets the requirements set forth in the preferred safety definition, thus validating the safety of that approach, as well as the usability of the definition.","PeriodicalId":447471,"journal":{"name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115660318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 180
Analysis of an electronic voting system 电子投票系统的分析
Pub Date : 2004-05-09 DOI: 10.1109/SECPRI.2004.1301313
Tadayoshi Kohno, A. Stubblefield, A. Rubin, D. Wallach
With significant U.S. federal funds now available to replace outdated punch-card and mechanical voting systems, municipalities and states throughout the U.S. are adopting paperless electronic voting systems from a number of different vendors. We present a security analysis of the source code to one such machine used in a significant share of the market. Our analysis shows that this voting system is far below even the most minimal security standards applicable in other contexts. We identify several problems including unauthorized privilege escalation, incorrect use of cryptography, vulnerabilities to network threats, and poor software development processes. We show that voters, without any insider privileges, can cast unlimited votes without being detected by any mechanisms within the voting terminal software. Furthermore, we show that even the most serious of our outsider attacks could have been discovered and executed without access to the source code. In the face of such attacks, the usual worries about insider threats are not the only concerns; outsiders can do the damage. That said, we demonstrate that the insider threat is also quite considerable, showing that not only can an insider, such as a poll worker, modify the votes, but that insiders can also violate voter privacy and match votes with the voters who cast them. We conclude that this voting system is unsuitable for use in a general election. Any paperless electronic voting system might suffer similar flaws, despite any certification it could have otherwise received. We suggest that the best solutions are voting systems having a voter-verifiable audit trail, where a computerized voting system might print a paper ballot that can be read and verified by the voter.
随着大量的美国联邦资金可用来取代过时的打孔卡和机械投票系统,美国各地的城市和州正在采用来自许多不同供应商的无纸化电子投票系统。我们提出了一个源代码的安全性分析,其中一个这样的机器在市场上使用的重要份额。我们的分析表明,这种投票系统甚至远远低于适用于其他环境的最低安全标准。我们确定了几个问题,包括未经授权的特权升级、不正确的加密使用、网络威胁漏洞和糟糕的软件开发过程。我们表明,没有任何内部特权的选民可以无限制地投票,而不会被投票终端软件内的任何机制检测到。此外,我们表明,即使是最严重的外部攻击也可以在没有访问源代码的情况下被发现和执行。面对此类攻击,通常对内部威胁的担忧并不是唯一的担忧;外人可能造成破坏。也就是说,我们证明了内部威胁也是相当可观的,表明内部人员,如投票工作人员,不仅可以修改选票,而且内部人员也可以侵犯选民的隐私,并将选票与投票的选民相匹配。我们的结论是这种投票制度不适合在大选中使用。任何无纸化电子投票系统都可能存在类似的缺陷,尽管它本可以获得任何认证。我们建议,最好的解决方案是拥有选民可验证的审计跟踪的投票系统,其中计算机化的投票系统可以打印出选民可以阅读和验证的纸质选票。
{"title":"Analysis of an electronic voting system","authors":"Tadayoshi Kohno, A. Stubblefield, A. Rubin, D. Wallach","doi":"10.1109/SECPRI.2004.1301313","DOIUrl":"https://doi.org/10.1109/SECPRI.2004.1301313","url":null,"abstract":"With significant U.S. federal funds now available to replace outdated punch-card and mechanical voting systems, municipalities and states throughout the U.S. are adopting paperless electronic voting systems from a number of different vendors. We present a security analysis of the source code to one such machine used in a significant share of the market. Our analysis shows that this voting system is far below even the most minimal security standards applicable in other contexts. We identify several problems including unauthorized privilege escalation, incorrect use of cryptography, vulnerabilities to network threats, and poor software development processes. We show that voters, without any insider privileges, can cast unlimited votes without being detected by any mechanisms within the voting terminal software. Furthermore, we show that even the most serious of our outsider attacks could have been discovered and executed without access to the source code. In the face of such attacks, the usual worries about insider threats are not the only concerns; outsiders can do the damage. That said, we demonstrate that the insider threat is also quite considerable, showing that not only can an insider, such as a poll worker, modify the votes, but that insiders can also violate voter privacy and match votes with the voters who cast them. We conclude that this voting system is unsuitable for use in a general election. Any paperless electronic voting system might suffer similar flaws, despite any certification it could have otherwise received. We suggest that the best solutions are voting systems having a voter-verifiable audit trail, where a computerized voting system might print a paper ballot that can be read and verified by the voter.","PeriodicalId":447471,"journal":{"name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116751440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 611
Fast portscan detection using sequential hypothesis testing 使用顺序假设检验的快速端口扫描检测
Pub Date : 2004-05-09 DOI: 10.1109/SECPRI.2004.1301325
Jaeyeon Jung, V. Paxson, A. Berger, H. Balakrishnan
Attackers routinely perform random portscans of IP addresses to find vulnerable servers to compromise. Network intrusion detection systems (NIDS) attempt to detect such behavior and flag these portscanners as malicious. An important need in such systems is prompt response: the sooner a NIDS detects malice, the lower the resulting damage. At the same time, a NIDS should not falsely implicate benign remote hosts as malicious. Balancing the goals of promptness and accuracy in detecting malicious scanners is a delicate and difficult task. We develop a connection between this problem and the theory of sequential hypothesis testing and show that one can model accesses to local IP addresses as a random walk on one of two stochastic processes, corresponding respectively to the access patterns of benign remote hosts and malicious ones. The detection problem then becomes one of observing a particular trajectory and inferring from it the most likely classification for the remote host. We use this insight to develop TRW (Threshold Random Walk), an online detection algorithm that identifies malicious remote hosts. Using an analysis of traces from two qualitatively different sites, we show that TRW requires a much smaller number of connection attempts (4 or 5 in practice) to detect malicious activity compared to previous schemes, while also providing theoretical bounds on the low (and configurable) probabilities of missed detection and false alarms. In summary, TRW performs significantly faster and also more accurately than other current solutions.
攻击者通常对IP地址进行随机端口扫描,以找到易受攻击的服务器。网络入侵检测系统(NIDS)尝试检测此类行为并将这些端口扫描器标记为恶意。此类系统的一个重要需求是快速响应:NIDS检测到恶意的时间越早,造成的损害就越小。同时,NIDS不应该错误地将良性远程主机视为恶意主机。在检测恶意扫描器时,平衡及时和准确的目标是一项微妙而困难的任务。我们将这个问题与序列假设检验理论联系起来,并表明可以将访问本地IP地址的访问建模为两个随机过程之一的随机漫步,分别对应于良性远程主机和恶意远程主机的访问模式。然后,检测问题就变成了观察一个特定的轨迹,并从中推断出远程主机最可能的分类。我们利用这一见解开发了TRW(阈值随机漫步),这是一种识别恶意远程主机的在线检测算法。通过对来自两个定性不同站点的痕迹进行分析,我们表明,与以前的方案相比,TRW需要更少的连接尝试(实践中为4或5次)来检测恶意活动,同时还提供了低(可配置的)未检测和假警报概率的理论界限。总之,与目前其他解决方案相比,TRW的执行速度更快,也更准确。
{"title":"Fast portscan detection using sequential hypothesis testing","authors":"Jaeyeon Jung, V. Paxson, A. Berger, H. Balakrishnan","doi":"10.1109/SECPRI.2004.1301325","DOIUrl":"https://doi.org/10.1109/SECPRI.2004.1301325","url":null,"abstract":"Attackers routinely perform random portscans of IP addresses to find vulnerable servers to compromise. Network intrusion detection systems (NIDS) attempt to detect such behavior and flag these portscanners as malicious. An important need in such systems is prompt response: the sooner a NIDS detects malice, the lower the resulting damage. At the same time, a NIDS should not falsely implicate benign remote hosts as malicious. Balancing the goals of promptness and accuracy in detecting malicious scanners is a delicate and difficult task. We develop a connection between this problem and the theory of sequential hypothesis testing and show that one can model accesses to local IP addresses as a random walk on one of two stochastic processes, corresponding respectively to the access patterns of benign remote hosts and malicious ones. The detection problem then becomes one of observing a particular trajectory and inferring from it the most likely classification for the remote host. We use this insight to develop TRW (Threshold Random Walk), an online detection algorithm that identifies malicious remote hosts. Using an analysis of traces from two qualitatively different sites, we show that TRW requires a much smaller number of connection attempts (4 or 5 in practice) to detect malicious activity compared to previous schemes, while also providing theoretical bounds on the low (and configurable) probabilities of missed detection and false alarms. In summary, TRW performs significantly faster and also more accurately than other current solutions.","PeriodicalId":447471,"journal":{"name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129613530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 786
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks 一种用于过滤传感器网络中注入的假数据的交错逐跳认证方案
Pub Date : 2004-05-09 DOI: 10.1109/SECPRI.2004.1301328
Sencun Zhu, Sanjeev Setia, S. Jajodia, P. Ning
Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects false data into the network with the goal of deceiving the base station or depleting the resources of the relaying nodes. Standard authentication mechanisms cannot prevent this attack if the adversary has compromised one or a small number of sensor nodes. In this paper, we present an interleaved hop-by-hop authentication scheme that guarantees that the base station will detect any injected false data packets when no more than a certain number t nodes are compromised. Further, our scheme provides an upper bound B for the number of hops that a false data packet could be forwarded before it is detected and dropped, given that there are up to t colluding compromised nodes. We show that in the worst case B is O(t/sup 2/). Through performance analysis, we show that our scheme is efficient with respect to the security it provides, and it also allows a tradeoff between security and performance.
传感器网络通常部署在无人值守的环境中,因此使这些网络容易受到虚假数据注入攻击,攻击者将虚假数据注入网络,目的是欺骗基站或耗尽中继节点的资源。如果攻击者已经破坏了一个或少数传感器节点,标准身份验证机制就无法阻止这种攻击。在本文中,我们提出了一种交错逐跳认证方案,保证在不超过一定数量的节点被破坏时,基站将检测到任何注入的假数据包。此外,我们的方案为在检测和丢弃错误数据包之前可以转发的跳数提供了上限B,假设有多达t个串连的受损节点。在最坏情况下,B等于0 (t/sup 2/)通过性能分析,我们证明了我们的方案就其提供的安全性而言是有效的,并且它还允许在安全性和性能之间进行权衡。
{"title":"An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks","authors":"Sencun Zhu, Sanjeev Setia, S. Jajodia, P. Ning","doi":"10.1109/SECPRI.2004.1301328","DOIUrl":"https://doi.org/10.1109/SECPRI.2004.1301328","url":null,"abstract":"Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects false data into the network with the goal of deceiving the base station or depleting the resources of the relaying nodes. Standard authentication mechanisms cannot prevent this attack if the adversary has compromised one or a small number of sensor nodes. In this paper, we present an interleaved hop-by-hop authentication scheme that guarantees that the base station will detect any injected false data packets when no more than a certain number t nodes are compromised. Further, our scheme provides an upper bound B for the number of hops that a false data packet could be forwarded before it is detected and dropped, given that there are up to t colluding compromised nodes. We show that in the worst case B is O(t/sup 2/). Through performance analysis, we show that our scheme is efficient with respect to the security it provides, and it also allows a tradeoff between security and performance.","PeriodicalId":447471,"journal":{"name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130061836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 700
A layered design of discretionary access controls with decidable safety properties 具有可确定安全属性的可自由支配访问控制的分层设计
Pub Date : 2004-05-09 DOI: 10.1109/SECPRI.2004.1301315
Jon A. Solworth, R. Sloan
An access control design can be viewed as a three layered entity: the general access control model; the parameterization of the access control model; and the initial users and objects of the system before it goes live. The design of this three-tiered mechanism can be evaluated according to two broad measures, the expressiveness versus the complexity of the system. In particular, the question arises: What security properties can be expressed and verified? We present a general access control model which can be parameterized at the second layer to implement (express) any of the standard Discretionary Access Control (DAC) models. We show that the safety problem is decidable for any access control model implemented using our general access control model. Until now, all general access control models that were known to be sufficiently expressive to implement the full range of DAC models had an undecidable safety problem. Thus, given our model all of the standard DAC models (plus many others) can be implemented in a system in which their safety properties are decidable.
访问控制设计可以看作是一个三层实体:通用访问控制模型;访问控制模型的参数化;以及系统运行前的初始用户和对象。这个三层机制的设计可以根据两个广泛的度量来评估,即系统的表现力和复杂性。特别地,问题出现了:哪些安全属性可以表示和验证?我们提出了一个通用的访问控制模型,该模型可以在第二层参数化,以实现(表达)任何标准的任意访问控制(DAC)模型。我们证明,对于使用我们的通用访问控制模型实现的任何访问控制模型,安全问题都是可确定的。到目前为止,所有已知能够充分表达以实现所有DAC模型的通用访问控制模型都存在无法确定的安全问题。因此,给定我们的模型,所有标准DAC模型(加上许多其他模型)都可以在其安全属性可确定的系统中实现。
{"title":"A layered design of discretionary access controls with decidable safety properties","authors":"Jon A. Solworth, R. Sloan","doi":"10.1109/SECPRI.2004.1301315","DOIUrl":"https://doi.org/10.1109/SECPRI.2004.1301315","url":null,"abstract":"An access control design can be viewed as a three layered entity: the general access control model; the parameterization of the access control model; and the initial users and objects of the system before it goes live. The design of this three-tiered mechanism can be evaluated according to two broad measures, the expressiveness versus the complexity of the system. In particular, the question arises: What security properties can be expressed and verified? We present a general access control model which can be parameterized at the second layer to implement (express) any of the standard Discretionary Access Control (DAC) models. We show that the safety problem is decidable for any access control model implemented using our general access control model. Until now, all general access control models that were known to be sufficiently expressive to implement the full range of DAC models had an undecidable safety problem. Thus, given our model all of the standard DAC models (plus many others) can be implemented in a system in which their safety properties are decidable.","PeriodicalId":447471,"journal":{"name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133749429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Effects of mobility and multihoming on transport-protocol security 移动性和多归属对传输协议安全性的影响
Pub Date : 2004-05-09 DOI: 10.1109/SECPRI.2004.1301312
T. Aura, P. Nikander, G. Camarillo
The Stream Control Transmission Protocol (SCTP) is a reliable message-based transport protocol developed by the IETF that could replace TCP in some applications. SCTP allows endpoints to have multiple IP addresses for the purposes of fault tolerance. There is on-going work to extend the SCTP multihoming functions to support dynamic addressing and endpoint mobility. This paper explains how the multihoming and mobility features can be exploited for denial-of-service attacks, connection hijacking, and packet flooding. We propose implementation guidelines for SCTP and changes to the mobility extensions that prevent most of the attacks. The same lessons apply to multihomed TCP variants and other transport-layer protocols that incorporate some flavor of dynamic addressing.
流控制传输协议(SCTP)是由IETF开发的一种可靠的基于消息的传输协议,可以在某些应用中取代TCP。为了容错,SCTP允许端点拥有多个IP地址。目前正在进行的工作是扩展SCTP多宿主功能,以支持动态寻址和端点移动性。本文解释了如何利用多宿主和移动性特性进行拒绝服务攻击、连接劫持和数据包泛滥。我们提出了SCTP的实现指南,并对防止大多数攻击的移动性扩展进行了修改。同样的经验也适用于多宿主TCP变体和其他包含某种动态寻址风格的传输层协议。
{"title":"Effects of mobility and multihoming on transport-protocol security","authors":"T. Aura, P. Nikander, G. Camarillo","doi":"10.1109/SECPRI.2004.1301312","DOIUrl":"https://doi.org/10.1109/SECPRI.2004.1301312","url":null,"abstract":"The Stream Control Transmission Protocol (SCTP) is a reliable message-based transport protocol developed by the IETF that could replace TCP in some applications. SCTP allows endpoints to have multiple IP addresses for the purposes of fault tolerance. There is on-going work to extend the SCTP multihoming functions to support dynamic addressing and endpoint mobility. This paper explains how the multihoming and mobility features can be exploited for denial-of-service attacks, connection hijacking, and packet flooding. We propose implementation guidelines for SCTP and changes to the mobility extensions that prevent most of the attacks. The same lessons apply to multihomed TCP variants and other transport-layer protocols that incorporate some flavor of dynamic addressing.","PeriodicalId":447471,"journal":{"name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125160401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Large-scale IP traceback in high-speed Internet: practical techniques and theoretical foundation 高速互联网中大规模IP溯源:实践技术与理论基础
Pub Date : 2004-05-09 DOI: 10.1109/SECPRI.2004.1301319
Jun Yu Li, Minho Sung, Jun Xu, Erran L. Li
Tracing attack packets to their sources, known as IP traceback, is an important step to counter distributed denial-of-service (DDoS) attacks. In this paper, we propose a novel packet logging based (i.e., hash-based) traceback scheme that requires an order of magnitude smaller processing and storage cost than the hash-based scheme proposed by Snoeren, et al. (2001), thereby being able to scalable to much higher link speed (e.g., OC-768). The baseline idea of our approach is to sample and log a small percentage (e.g., 3.3%) of packets. The challenge of this low sampling rate is that much more sophisticated techniques need to be used for traceback. Our solution is to construct the attack tree using the correlation between the attack packets sampled by neighboring routers. The scheme using naive independent random sampling does not perform well due to the low correlation between the packets sampled by neighboring routers. We invent a sampling scheme that improves this correlation and the overall efficiency significantly. Another major contribution of this work is that we introduce a novel information-theoretic framework for our traceback scheme to answer important questions on system parameter tuning and the fundamental trade-off between the resource used for traceback and the traceback accuracy. Simulation results based on real-world network topologies (e.g. Skitter) match very well with results from the information-theoretic analysis. The simulation results also demonstrate that our traceback scheme can achieve high accuracy, and scale very well to a large number of attackers (e.g., 5000+).
跟踪攻击数据包到它们的来源,称为IP回溯,是对抗分布式拒绝服务(DDoS)攻击的重要步骤。在本文中,我们提出了一种新颖的基于数据包日志(即基于哈希的)回溯方案,该方案所需的处理和存储成本比Snoeren等人(2001)提出的基于哈希的方案要小一个数量级,因此能够扩展到更高的链路速度(例如OC-768)。我们方法的基本思路是对一小部分(例如,3.3%)数据包进行采样和记录。这种低采样率的挑战是需要使用更复杂的技术进行追溯。我们的解决方案是利用相邻路由器采样的攻击报文之间的相关性来构建攻击树。采用朴素独立随机抽样的方案由于邻居路由器抽样报文之间的相关性较低而性能不佳。我们发明了一种采样方案,可以显著提高这种相关性和整体效率。这项工作的另一个主要贡献是,我们为我们的追溯方案引入了一个新的信息论框架,以回答有关系统参数调优以及用于追溯的资源与追溯精度之间的基本权衡的重要问题。基于真实网络拓扑(如迅猎兽)的仿真结果与信息论分析的结果非常吻合。仿真结果还表明,我们的追溯方案可以达到较高的准确性,并且可以很好地扩展到大量攻击者(例如5000+)。
{"title":"Large-scale IP traceback in high-speed Internet: practical techniques and theoretical foundation","authors":"Jun Yu Li, Minho Sung, Jun Xu, Erran L. Li","doi":"10.1109/SECPRI.2004.1301319","DOIUrl":"https://doi.org/10.1109/SECPRI.2004.1301319","url":null,"abstract":"Tracing attack packets to their sources, known as IP traceback, is an important step to counter distributed denial-of-service (DDoS) attacks. In this paper, we propose a novel packet logging based (i.e., hash-based) traceback scheme that requires an order of magnitude smaller processing and storage cost than the hash-based scheme proposed by Snoeren, et al. (2001), thereby being able to scalable to much higher link speed (e.g., OC-768). The baseline idea of our approach is to sample and log a small percentage (e.g., 3.3%) of packets. The challenge of this low sampling rate is that much more sophisticated techniques need to be used for traceback. Our solution is to construct the attack tree using the correlation between the attack packets sampled by neighboring routers. The scheme using naive independent random sampling does not perform well due to the low correlation between the packets sampled by neighboring routers. We invent a sampling scheme that improves this correlation and the overall efficiency significantly. Another major contribution of this work is that we introduce a novel information-theoretic framework for our traceback scheme to answer important questions on system parameter tuning and the fundamental trade-off between the resource used for traceback and the traceback accuracy. Simulation results based on real-world network topologies (e.g. Skitter) match very well with results from the information-theoretic analysis. The simulation results also demonstrate that our traceback scheme can achieve high accuracy, and scale very well to a large number of attackers (e.g., 5000+).","PeriodicalId":447471,"journal":{"name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125234232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 185
Formalizing sensitivity in static analysis for intrusion detection 入侵检测静态分析中灵敏度的形式化
Pub Date : 2004-05-09 DOI: 10.1109/SECPRI.2004.1301324
H. Feng, Jonathon T. Giffin, Yong Huang, S. Jha, Wenke Lee, B. Miller
A key function of a host-based intrusion detection system is to monitor program execution. Models constructed using static analysis have the highly desirable feature that they do not produce false alarms; however, they may still miss attacks. Prior work has shown a trade-off between efficiency and precision. In particular, the more accurate models based upon pushdown automata (PDA) are very inefficient to operate due to non-determinism in stack activity. In this paper, we present techniques for determinizing PDA models. We first provide a formal analysis framework of PDA models and introduce the concepts of determinism and stack-determinism. We then present the VP-Static model, which achieves determinism by extracting information about stack activity of the program, and the Dyck model, which achieves stack-determinism by transforming the program and inserting code to expose program state. Our results show that in run-time monitoring, our models slow execution of our test programs by 1% to 135%. This shows that reasonable efficiency needs not be sacrificed for model precision. We also compare the two models and discover that deterministic PDA are more efficient, although stack-deterministic PDA require less memory.
基于主机的入侵检测系统的一个关键功能是监控程序的执行。使用静态分析构建的模型具有非常理想的特征,即它们不会产生假警报;然而,他们仍然可能错过攻击。先前的工作已经表明了效率和精度之间的权衡。特别是,由于堆栈活动的不确定性,基于下推自动机(PDA)的更精确模型的操作效率非常低。在本文中,我们提出了确定PDA模型的技术。我们首先提供了PDA模型的形式化分析框架,并引入了决定论和堆栈决定论的概念。然后,我们提出了VP-Static模型,该模型通过提取程序的堆栈活动信息来实现确定性,以及Dyck模型,该模型通过转换程序和插入代码来暴露程序状态来实现堆栈确定性。我们的结果表明,在运行时监控中,我们的模型将测试程序的执行速度降低了1%到135%。这说明合理的效率并不需要为了模型精度而牺牲。我们还比较了两种模型,发现确定性的PDA效率更高,尽管堆栈确定性的PDA需要更少的内存。
{"title":"Formalizing sensitivity in static analysis for intrusion detection","authors":"H. Feng, Jonathon T. Giffin, Yong Huang, S. Jha, Wenke Lee, B. Miller","doi":"10.1109/SECPRI.2004.1301324","DOIUrl":"https://doi.org/10.1109/SECPRI.2004.1301324","url":null,"abstract":"A key function of a host-based intrusion detection system is to monitor program execution. Models constructed using static analysis have the highly desirable feature that they do not produce false alarms; however, they may still miss attacks. Prior work has shown a trade-off between efficiency and precision. In particular, the more accurate models based upon pushdown automata (PDA) are very inefficient to operate due to non-determinism in stack activity. In this paper, we present techniques for determinizing PDA models. We first provide a formal analysis framework of PDA models and introduce the concepts of determinism and stack-determinism. We then present the VP-Static model, which achieves determinism by extracting information about stack activity of the program, and the Dyck model, which achieves stack-determinism by transforming the program and inserting code to expose program state. Our results show that in run-time monitoring, our models slow execution of our test programs by 1% to 135%. This shows that reasonable efficiency needs not be sacrificed for model precision. We also compare the two models and discover that deterministic PDA are more efficient, although stack-deterministic PDA require less memory.","PeriodicalId":447471,"journal":{"name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132630057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 184
Securing OLAP data cubes against privacy breaches 保护OLAP数据集免受隐私泄露
Pub Date : 2004-05-09 DOI: 10.1109/SECPRI.2004.1301322
Lingyu Wang, S. Jajodia, D. Wijesekera
An OLAP (On-line Analytic Processing) system with insufficient security countermeasures may disclose sensitive information and breach an individual's privacy. Both unauthorized accesses and malicious inferences may lead to such inappropriate disclosures. Existing access control models in relational databases are unsuitable for the multi-dimensional data cubes used by OLAP. Inference control methods in statistical databases are expensive and apply to limited situations only. We first devise a flexible framework for specifying authorization objects in data cubes. The framework can partition a data cube both vertically based on dimension hierarchies and horizontally based on slices of data. We then study how to control inferences in data cubes. The proposed method eliminates both unauthorized accesses and malicious inferences. Its effectiveness does not depend on specific types of aggregation functions, external knowledge, or sensitivity criteria. The technique is efficient and readily implementable. Its on-line performance overhead is comparable to that of the minimal security requirement. Its enforcement requires little modification to existing OLAP systems.
安全对策不足的联机分析处理(OLAP)系统可能会泄露敏感信息,侵犯个人隐私。未经授权的访问和恶意推断都可能导致这种不适当的披露。现有的关系数据库访问控制模型不适合OLAP使用的多维数据集。统计数据库中的推理控制方法是昂贵的,并且只适用于有限的情况。我们首先设计一个灵活的框架,用于在数据集中指定授权对象。该框架可以根据维度层次结构垂直划分数据立方体,也可以根据数据片水平划分数据立方体。然后,我们将研究如何控制数据集中的推断。该方法消除了未经授权的访问和恶意推理。它的有效性不依赖于特定类型的聚合函数、外部知识或敏感性标准。该技术高效且易于实现。它的在线性能开销与最低安全性要求相当。它的实施几乎不需要对现有的OLAP系统进行修改。
{"title":"Securing OLAP data cubes against privacy breaches","authors":"Lingyu Wang, S. Jajodia, D. Wijesekera","doi":"10.1109/SECPRI.2004.1301322","DOIUrl":"https://doi.org/10.1109/SECPRI.2004.1301322","url":null,"abstract":"An OLAP (On-line Analytic Processing) system with insufficient security countermeasures may disclose sensitive information and breach an individual's privacy. Both unauthorized accesses and malicious inferences may lead to such inappropriate disclosures. Existing access control models in relational databases are unsuitable for the multi-dimensional data cubes used by OLAP. Inference control methods in statistical databases are expensive and apply to limited situations only. We first devise a flexible framework for specifying authorization objects in data cubes. The framework can partition a data cube both vertically based on dimension hierarchies and horizontally based on slices of data. We then study how to control inferences in data cubes. The proposed method eliminates both unauthorized accesses and malicious inferences. Its effectiveness does not depend on specific types of aggregation functions, external knowledge, or sensitivity criteria. The technique is efficient and readily implementable. Its on-line performance overhead is comparable to that of the minimal security requirement. Its enforcement requires little modification to existing OLAP systems.","PeriodicalId":447471,"journal":{"name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128897415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 87
An empirical analysis of target-resident DoS filters 目标驻留DoS过滤器的实证分析
Pub Date : 2004-05-09 DOI: 10.1109/SECPRI.2004.1301318
Michael Patrick Collins, M. Reiter
Numerous techniques have been proposed by which an end-system, subjected to a denial-of-service flood, filters the offending traffic. In this paper, we provide an empirical analysis of several such proposals, using traffic recorded at the border of a large network and including real DoS traffic. We focus our analysis on four filtering techniques, two based on the addresses from which the victim server typically receives traffic (static clustering and network-aware clustering), and two based on coarse indications of the path each packet traverses (hop-count filtering and path identifiers). Our analysis reveals challenges facing the proposed techniques in practice, and the implications of these issues for effective filtering. In addition, we compare techniques on equal footing, by evaluating the performance of one scheme under assumptions made by another. We conclude with an interpretation of the results and suggestions for further analysis.
已经提出了许多技术,通过这些技术,终端系统可以在遭受拒绝服务泛滥的情况下过滤违规流量。在本文中,我们对几个这样的建议进行了实证分析,使用在大型网络边界记录的流量,包括真实的DoS流量。我们将分析重点放在四种过滤技术上,其中两种基于受害服务器通常接收流量的地址(静态集群和网络感知集群),另两种基于每个数据包经过的路径的粗略指示(跳数过滤和路径标识符)。我们的分析揭示了在实践中所提出的技术面临的挑战,以及这些问题对有效过滤的影响。此外,我们在平等的基础上比较技术,通过评估一种方案在另一种方案的假设下的性能。最后,我们对结果进行了解释,并提出了进一步分析的建议。
{"title":"An empirical analysis of target-resident DoS filters","authors":"Michael Patrick Collins, M. Reiter","doi":"10.1109/SECPRI.2004.1301318","DOIUrl":"https://doi.org/10.1109/SECPRI.2004.1301318","url":null,"abstract":"Numerous techniques have been proposed by which an end-system, subjected to a denial-of-service flood, filters the offending traffic. In this paper, we provide an empirical analysis of several such proposals, using traffic recorded at the border of a large network and including real DoS traffic. We focus our analysis on four filtering techniques, two based on the addresses from which the victim server typically receives traffic (static clustering and network-aware clustering), and two based on coarse indications of the path each packet traverses (hop-count filtering and path identifiers). Our analysis reveals challenges facing the proposed techniques in practice, and the implications of these issues for effective filtering. In addition, we compare techniques on equal footing, by evaluating the performance of one scheme under assumptions made by another. We conclude with an interpretation of the results and suggestions for further analysis.","PeriodicalId":447471,"journal":{"name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115219799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
期刊
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1