{"title":"ACML: Capability Based Attack Modeling Language","authors":"N. Pandey, S. K. Gupta, Shaveta Leekha, J. Zhou","doi":"10.1109/IAS.2008.26","DOIUrl":"https://doi.org/10.1109/IAS.2008.26","url":null,"abstract":"In this paper, we propose attack capability modelling language (ACML) used for capability model proposed by Zhau et. al. is a specification and description language that has been utilized to express the capability gained by attacker at each step in the intrusion process. These capabilities have been defined using the IDS alerts. Moreover the language also provides for the specification of compete attack scenarios in terms of capabilities of the intruder. This, in turn, helps to determine the state of the system, in terms of the extent of infiltration. ACML helps to avoid ambiguity in capability specifications while sharing among developers. We also propose attack capability modelling framework (ACMF) which forms the basis of a capability model-based semi-automated alert correlation process, which has been used to detect and identify the attack scenarios from IDS alerts. The framework consists of the tools for the implementation of the algebraic structure of capability, as defined in Pandey et al., which are needed for the correlation algorithm. Additionally, the language also has features for customizing the definitions of these structures as well as for customizing the correlation algorithm. To verify the expressiveness of the language and its suitability in describing attack capability model, experimental result of standard benchmark has been discussed.","PeriodicalId":103328,"journal":{"name":"2008 The Fourth International Conference on Information Assurance and Security","volume":"262 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131960865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Assurance in Critical Infrastructures via Wireless Sensor Networks","authors":"M. Albano, S. Chessa, R. D. Pietro","doi":"10.1109/IAS.2008.54","DOIUrl":"https://doi.org/10.1109/IAS.2008.54","url":null,"abstract":"Information assurance in critical infrastructure is an issue that has been addressed generally focusing on real-time or quasi real-time monitoring of the critical infrastructure; so that action could be undertaken when anomalies arise, to avoid more severe consequences to the infrastructure. In this paper, we relax the hypothesis of intervening when anomalies are detected: we focus on sensed data survivability. Specifically, we study this problem in a specific critical infrastructure: pipelines. The problem we introduce is how to place sensors in such a way that the sensed data related to the monitoring of the pipeline will survive even in presence of a partial destruction of the infrastructure. The contributions of this paper are twofold. First, we introduce the problem of sensed data survivability in critical infrastructure. In this framework, the goal is to have the sensed data to survive to the infrastructure failure, so that the phenomena that lead to the failure could be better understood and possibly tackled in similar deployment. Second, we provide a model that allows to produce an optimal network topology with respect to the level of information assurance desired, while satisfying deployment constraints, such as available bandwidth and available energy of the sensors. We believe that the work addressed in this paper could foster further research in the field of information assurance in critical infrastructure.","PeriodicalId":103328,"journal":{"name":"2008 The Fourth International Conference on Information Assurance and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132404065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Analysis of Temporal-RBAC Using Timed Automata","authors":"S. Mondal, S. Sural","doi":"10.1109/IAS.2008.10","DOIUrl":"https://doi.org/10.1109/IAS.2008.10","url":null,"abstract":"Role Based Access Control (RBAC) is arguably the most common access control mechanism today due to its applicability at various levels of authorization in a system. Time varying nature of access control in RBAC administered systems is often implemented through Temporal-RBAC - an extension of RBAC in the temporal domain. In this paper, we propose an initial approach towards verification of security properties of a Temporal-RBAC system. Each role is mapped to a timed automaton. A controller automaton is used to activate and deactivate various roles. Security properties are specified using Computation Tree Logic (CTL) and are verified with the help of a model checking tool named Uppaal. We have specifically considered reachability, safety and liveness properties to show the usefulness of our approach.","PeriodicalId":103328,"journal":{"name":"2008 The Fourth International Conference on Information Assurance and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128409928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiyoun Jeoung, Eun-Ji Shin, Seng-phil Hong, Sung-Hoon Kim, I. Kim, Min-Woo Lee
{"title":"Systematic Website Verification for Privacy Protection","authors":"Jiyoun Jeoung, Eun-Ji Shin, Seng-phil Hong, Sung-Hoon Kim, I. Kim, Min-Woo Lee","doi":"10.1109/IAS.2008.48","DOIUrl":"https://doi.org/10.1109/IAS.2008.48","url":null,"abstract":"The Internet is now a prime vehicle for business, community, and personal interactions. The privacy of individuals sensitive information has become a major concern of consumers who use the Web to purchase goods or obtain services in Web-based computing environments. In this paper, we analyze the risks pertaining to various Web sites in Korea, and propose the dynamic Web site verification system (DWVS) for minimizing illegal sharing of sensitive information. We also demonstrate the feasibility of our framework through a proof-of concept implementation.","PeriodicalId":103328,"journal":{"name":"2008 The Fourth International Conference on Information Assurance and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126558163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Operator-Centric and Adaptive Intrusion Detection","authors":"U. Larson, S. Lindskog, D. Nilsson, E. Jonsson","doi":"10.1109/IAS.2008.42","DOIUrl":"https://doi.org/10.1109/IAS.2008.42","url":null,"abstract":"An intrusion detection system should support the operator of the system. Thus, in addition to producing alerts, it should allow for easy insertion of new detection algorithms. It should also support dynamic selection and de-selection of detection algorithms, and it should adjust its resource consumption to the current need. Such a system would allow the operator to easily extend the system when new detection algorithms become available. It would also allow the operator to maintain a low-cost monitoring baseline and perform more extensive monitoring when it is required. In this paper we propose an architecture for intrusion detection which aims at providing the operator with this support. The architecture uses a modular design to promote a high degree of flexibility. This supports creation of an environment in which state-of-the-art intrusion detection algorithms easily can be inserted. The modular design also allows for detection algorithms to be enabled and disabled when required. Additionally, the architecture uses a sensor reconfiguration mechanism to affect the amount of data collected. When a detection algorithm is enabled or disabled, the sensor providing the input data to the algorithm is correspondingly reconfigured. This implies a minimum of excess collected data. To illustrate the feasibility of the architecture, we provide a proof - of-concept supporting monitoring of users for insider detection and webserver monitoring for intrusion attempts.","PeriodicalId":103328,"journal":{"name":"2008 The Fourth International Conference on Information Assurance and Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126567463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speaker Identification by Multi-Frame Generative Models","authors":"D. Impedovo, M. Refice","doi":"10.1109/IAS.2008.15","DOIUrl":"https://doi.org/10.1109/IAS.2008.15","url":null,"abstract":"In this paper an approach called multi-frame speaker models (MFS) is proposed, in order to cope with performance degradation generally observed over (short and medium) time and trials in speaker identification's task. The approach, based on generative models, uses multiple frame's length for speech processing in training and testing phase. A complete multi-expert system is also presented which is able to implement the proposed approach onthe whole set of speakers and to obtain a near optimum for the ER's reduction.","PeriodicalId":103328,"journal":{"name":"2008 The Fourth International Conference on Information Assurance and Security","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128567102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Threshold Proxy Signature Scheme with Strong Real-Time Efficiency","authors":"Xiaoming Wang, Huoyan Chen","doi":"10.1109/IAS.2008.8","DOIUrl":"https://doi.org/10.1109/IAS.2008.8","url":null,"abstract":"The threshold proxy signature scheme with strong real-time efficiency is proposed based on a trapdoor hash function and the sharing secret technology. In the scheme, the procedure of generating threshold proxy signature is performed in two phases. The off-line phase generates a threshold proxy pre-signature before the message to be signed is even known. The pre-signature is independent of the particular message to be signed and is stored for future in the on-line phase. While on-line phase generates quickly a threshold proxy signature using the pre-signature once the message to be signed is presented. The on-line phase is typically very fast and strong real-time efficiency since it only needs a few modular additions and multiplications and one round of communication among proxy signers. Furthermore, the scheme not only has strong real-time efficiency, but also withstands the conspiracy attack existed in the previous schemes and requires no trusted third party. The scheme is particularly useful for requiring the strong real-time efficiency and fully distributed networks such as electric wallet or smart cards etc.","PeriodicalId":103328,"journal":{"name":"2008 The Fourth International Conference on Information Assurance and Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126142149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing a DRM System","authors":"Franco Frattolillo, F. Landolfi","doi":"10.1109/IAS.2008.9","DOIUrl":"https://doi.org/10.1109/IAS.2008.9","url":null,"abstract":"The digital rights management (DRM) systems aim at protecting and enforcing the legal rights associated with the use of digital content distributed on the Internet. Most of such systems use watermarking techniques to implement the content protection. Although the effectiveness of the implemented protection strictly depends on the adopted watermarking techniques, an important role is also played by watermarking protocols. They define the scheme of the interactions that have to take place among the entities involved in the processes of content protection and Web-based distribution governed by the DRM systems. This paper presents a DRM system developed as a Web software platform to implement the copyright protection of multimedia digital content distributed on the Internet. The DRM system is based on a watermarking protocol previously developed by the authors, and has been designed as a service oriented architecture composed of a federation of coordinated Web entities that play distinct roles and interact within a trusted environment.","PeriodicalId":103328,"journal":{"name":"2008 The Fourth International Conference on Information Assurance and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116915566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}