43rd Annual 2009 International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
Dynamic intrusion detection system based on feature extraction and multidimensional hidden Markov model analysis 基于特征提取和多维隐马尔可夫模型分析的动态入侵检测系统
43rd Annual 2009 International Carnahan Conference on Security Technology Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335559
Chang-Lung Tsai, Allen Y. Chang, Chun-Jung Chen, Wen-Jieh Yu, Ling-Hong Chen
{"title":"Dynamic intrusion detection system based on feature extraction and multidimensional hidden Markov model analysis","authors":"Chang-Lung Tsai, Allen Y. Chang, Chun-Jung Chen, Wen-Jieh Yu, Ling-Hong Chen","doi":"10.1109/CCST.2009.5335559","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335559","url":null,"abstract":"In this paper, a novel intrusion detection system based on diversity timing factor, combining the characteristic of dynamic and static adaption, sniffing from multi-stage and analyzing with multi-dimensional hidden Markov model has been proposed. In the proposed mechanism, detection, expert, and console modules are developed. In which, the detection module is deployed with numbers of independent sensors on each node/device of the network. This module not only takes the responsibility to detect and collect all of the desired information on each different timing period and stage, but also denotes specific weighting function to indicate the significance of possible influence and tune the value according to the frequency and times of the occurrence of security events on each collected data. All of the collected audit data and detected normal/abnormal signals will be transferred to the database of the expert module for further integrated evaluation on those multiple observing factors and processed with synthetic information and associative events analysis based on hidden Markov model algorithm on multidimensional. After then, the fuzzy inferring rule is applied for intrusion recognition and identification. The console module is assigned to manage the performance of the system, control all of the sensors for monitoring security events and generate alerts and offer periodically reports and present proposals for taking suitable response and making optimal decision. Experimental results demonstrate that the proposed IDS mechanism possesses good efficiency and performance.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129159474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy friendly applications using citizen cards based on cryptographic smartcards 使用基于加密智能卡的公民卡的隐私友好应用程序
43rd Annual 2009 International Carnahan Conference on Security Technology Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335541
R. Sánchez-Reillo, Ivan Rubio-Polo, R. Alonso-Moreno, Aitor Mendaza-Ormaza
{"title":"Privacy friendly applications using citizen cards based on cryptographic smartcards","authors":"R. Sánchez-Reillo, Ivan Rubio-Polo, R. Alonso-Moreno, Aitor Mendaza-Ormaza","doi":"10.1109/CCST.2009.5335541","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335541","url":null,"abstract":"Citizen Cards are being deployed nowadays. Several applications are being developed using such cards. Different kind of services can be provided with such cards, from services demanded by the Administration, to applications from private companies. Unfortunately there is a great amount of applications that are not able nowadays to use the security these cards offer, due to their requirement of keeping the end-user anonymous. This requirement can be forced by the kind of application (e.g. restricted to certain ages), of by data protection laws, where there is no need to access personal data to provide a local service. Authors are proposing in this paper two solutions for this kind of services, benefiting from the already deployed citizen cards, reducing the cost of developing a new card, as well as maintain the card system.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123119817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusive behavior analysis based on honey pot tracking and ant algorithm analysis 基于蜜罐跟踪和蚂蚁算法分析的入侵行为分析
43rd Annual 2009 International Carnahan Conference on Security Technology Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335531
Chang-Lung Tsai, Chun-Chi Tseng, Chin-Chuan Han
{"title":"Intrusive behavior analysis based on honey pot tracking and ant algorithm analysis","authors":"Chang-Lung Tsai, Chun-Chi Tseng, Chin-Chuan Han","doi":"10.1109/CCST.2009.5335531","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335531","url":null,"abstract":"In this paper, a novel intrusion behavior analysis mechanism based on the design of honey pot and the diagnosis of ant colony algorithm has been proposed. In which, there are monitor module, track module, and analysis module developed. The intrusive behavior is then analyzed through the above modules. In the developed honey pot, all of the architecture, database, directory, security parameters are updated dynamically and timely to evade the probe test from the intruders. To record the traverse of an intrusion, the pheromone will be deposited as discovered. In addition, in order to exactly and correctly measure the capability of the intruders, the content of those discovered file, path and database will be updated and the security setting will also be enhanced timely to raise the difficulty of visiting or access again. All of the traverse of intruders and the corresponding behavior will be analyzed based on ant colony algorithm. Experimental results demonstrate that the proposed IDS mechanism possesses good efficiency and performance.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130481606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Omnitrax ranging leaky coaxial cable sensor technology update Omnitrax测距泄漏同轴电缆传感器技术更新
43rd Annual 2009 International Carnahan Conference on Security Technology Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335537
K. Harman
{"title":"Omnitrax ranging leaky coaxial cable sensor technology update","authors":"K. Harman","doi":"10.1109/CCST.2009.5335537","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335537","url":null,"abstract":"The OmniTrax® leaky coaxial cable perimeter intrusion detection system was first introduced at the 2004 International Carnahan Conference [1]. This sensor evolved from the technology of “GUIDAR” pioneered in the 1970's to bring intrusion location to perimeter sensors. OmniTrax theory of operation, based on a unique application of new Ultra Wideband Radar was described, as well as its feature of allowing pinpoint location of intrusions along 800m of sensor cable using a single processor. This feature is fundamentally important to direct the response force, and also for rapid debug and maintenance of the installation. Since that first presentation the sensor has been fully realized as one of the most cost-effective ranging perimeter sensors with its own integrated power and communications network. It has also been evaluated for both detection and environmental performance at our own local test site (SITE), and at independent government sensor test agencies. Further components of the technology have been developed to enlarge the range of site applications. This paper provides an update on the technology and its application including some new applications for leaky coaxial cable technology. One such new application has been selected for more detailed discussion in the paper entitled “A Rapid Deployment Guided Radar Sensor” that also appears in these proceedings.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130684142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Fundamental upgrade of the internal network system within the National Police Agency of Japan 日本警察厅内部网络系统的根本性升级
43rd Annual 2009 International Carnahan Conference on Security Technology Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335558
T. Yasuhira
{"title":"Fundamental upgrade of the internal network system within the National Police Agency of Japan","authors":"T. Yasuhira","doi":"10.1109/CCST.2009.5335558","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335558","url":null,"abstract":"The National Police Agency has contributed to the construction, maintenance, and management of its own nationwide info-communications network composed of a microwave radio system operated by the NPA, dedicated lines leased from major carriers and so on. Due to overhanging crises of natural disasters and threats posed by people of malicious intent to the confidential police network, the NPA is urgently exposed to the pressure to upgrade its internal network system. Thanks to the remarkable progress in the field of IT, more securely and qualitatively reliable communications and efficient methods for information sharing have been actively proposed and developed by various IT vendors. By taking advantage of the latest technologies, the NPA is under the way to strengthen the whole of its own network.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131243893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The integrated security system of the Senate of the Italian Republic 意大利共和国参议院的综合安全系统
43rd Annual 2009 International Carnahan Conference on Security Technology Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335556
Giovanni Contardi, F. Garzia, R. Cusani
{"title":"The integrated security system of the Senate of the Italian Republic","authors":"Giovanni Contardi, F. Garzia, R. Cusani","doi":"10.1109/CCST.2009.5335556","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335556","url":null,"abstract":"The security of a complex site is strongly dependent on the use of integrated technological systems. Any weakness of the integrated system involves a weakness of the security of the site itself. For this reason it is necessary to design and realize highly integrated, efficient and reliable security systems. The authors illustrate the work made to design and realize the integrated security system of the Senate of the Italian Republic.)","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130497429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Security of generalized signature scheme based on discrete logarithms and factorization 基于离散对数和因子分解的广义签名方案的安全性
43rd Annual 2009 International Carnahan Conference on Security Technology Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335530
Chien-Lung Hsu, Yu-Hao Chuang, Wei-Hua He, So-Lin Yen, C. Tseng, Chia-Wen Chen
{"title":"Security of generalized signature scheme based on discrete logarithms and factorization","authors":"Chien-Lung Hsu, Yu-Hao Chuang, Wei-Hua He, So-Lin Yen, C. Tseng, Chia-Wen Chen","doi":"10.1109/CCST.2009.5335530","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335530","url":null,"abstract":"In 2005, Pon et al. proposed a generalized signature scheme based on the intractability of solving two well-known cryptographic assumptions, the factorization (FAC) and the discrete logarithm problem (DLP). They claimed that their scheme is still secure, provided that one of these two assumptions is solved. This paper, however, will show that Pon et al.'s scheme is insecure against the universal forgery attack if the adversary can solve the DLP.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133744917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using learning content management systems as highly adaptive and efficient supporting tool for (recurrent) training — an applied perspective 使用学习内容管理系统作为(经常性)培训的高适应性和高效的支持工具-应用视角
43rd Annual 2009 International Carnahan Conference on Security Technology Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335566
Hofer Franziska, Wetter Olive Emil, Graf Roland
{"title":"Using learning content management systems as highly adaptive and efficient supporting tool for (recurrent) training — an applied perspective","authors":"Hofer Franziska, Wetter Olive Emil, Graf Roland","doi":"10.1109/CCST.2009.5335566","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335566","url":null,"abstract":"The nature of the daily security business at airports (e.g. fast changing regulations) demands more and more flexible training and communication solutions for security officers at airports. Classical classroom training is a proven way for (re− training, but alternative tools, in particular e-solutions, could be taken into account more often to support the classical method of training.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130147511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Robustness against misuse - a new attribute of technical systems 抗误用的健壮性——技术系统的新属性
43rd Annual 2009 International Carnahan Conference on Security Technology Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335516
Z. Vintr, D. Valis
{"title":"Robustness against misuse - a new attribute of technical systems","authors":"Z. Vintr, D. Valis","doi":"10.1109/CCST.2009.5335516","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335516","url":null,"abstract":"Operation of a number of technical systems is related to the danger of events' occurrence posing threat to human health and life, resulting in material damage or damage to the environment. Methods and procedures used for risk management take into consideration also a failure of a human factor as a possible cause of dangerous events' occurrence, but they do not give us opportunity to take into account a possible intention of man who can cause a dangerous event on purpose. In view of the terrorist threat we lack a coherent methodology which would enable us to influence system ability so that it could reduce its consequences or it could be protected against misuse by its design solution. This ability of a system is called robustness against misuse. The article presents fundamental approaches of new methodology which enable us to specify systems' robustness requirements, to describe and classify “weak” points of the systems, to analyze and assess robustness level, and to find and suggest effective ways of increasing the systems' robustness against misuse. The presented methodology is based on the assumption that similarly, as in case of dependability and safety, the assurance of system robustness should be also an object of systematic attention in all phases of the system life cycle, and that the system robustness against misuse is formed in a crucial manner mainly in the early phases of a life cycle (so called premanufacturing stages - conception, development, design).","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114261560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis on compact data formats for the performance of handwritten signature biometrics 手写体签名生物识别性能的压缩数据格式分析
43rd Annual 2009 International Carnahan Conference on Security Technology Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335512
O. Miguel-Hurtado, L. Mengibar-Pozo, Inmaculada Tomeo-Reyes, J. Liu-Jimenez
{"title":"Analysis on compact data formats for the performance of handwritten signature biometrics","authors":"O. Miguel-Hurtado, L. Mengibar-Pozo, Inmaculada Tomeo-Reyes, J. Liu-Jimenez","doi":"10.1109/CCST.2009.5335512","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335512","url":null,"abstract":"This paper deals with the Signature Data Formats proposed by ISO 19794 project: 19794 part 7 Full Format and Compact Format (published in 2007) and the new 19794 part 11, which is under development. It will be shown how these formats handle the raw data coming from a Signature Input Device, and what the size of a Biometric Information Record is for each one. Another compression method, using LZ77 compression algorithm, is proposed and tested. The paper will also show the impact of using these compact formats on the performance of two different algorithms: Dynamic Time Warping and Gaussian Mixture Models. MCyT and SVC2004 signature databases have been used to carry out all tests.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129398230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信