2009 Cybersecurity Applications & Technology Conference for Homeland Security最新文献

筛选
英文 中文
Logical Network Boundary Controller 逻辑网络边界控制器
John Wu, Yongdae Kim, R. Marotz, R. Ramanujan, J. Tyra
{"title":"Logical Network Boundary Controller","authors":"John Wu, Yongdae Kim, R. Marotz, R. Ramanujan, J. Tyra","doi":"10.1109/CATCH.2009.16","DOIUrl":"https://doi.org/10.1109/CATCH.2009.16","url":null,"abstract":"Secure and timely information and intelligence sharing is essential in combatting terrorism and/or responding to emergency situations. Adequate security boundary controls are needed to ensure that sensitive information stays within the defined boundaries while being shared across the networks. The traditional technologies such as the Guard, VPN and Firewall have proven to be unworkable and cost-prohibitive. This paper presents the architecture of a network boundary control technology called the Logical Network Boundary Controller (LNBC) that overcomes limitations of traditional approaches to secure information sharing across multiple security domains. The software-based LNBC technology can be applied to cost-effectively implement multiple domain security for various existing collaboration tools to create a rapidly configurable and ad hoc collaboration environment for both synchronous and asynchronous applications. A prototype implementation of LNBC is also described in the paper.","PeriodicalId":130933,"journal":{"name":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121755663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Malware Capture 网络恶意软件捕获
Christopher Jordan, Alice Chang, Kun Luo
{"title":"Network Malware Capture","authors":"Christopher Jordan, Alice Chang, Kun Luo","doi":"10.1109/CATCH.2009.11","DOIUrl":"https://doi.org/10.1109/CATCH.2009.11","url":null,"abstract":"Botnets are a fundamental threat to network security. Their lifecycle follows a repeated pattern of growth via exploitation, infection and communication(command & control). Preventing botnet command & control requires runtime knowledge of communication attributes on a per bot basis. One approach to this is to evaluate the malware binary, but this approach is often significantly hampered by software obfuscation techniques designed to thwart binary analysis. Our research is focused on the collection and analysis of botnet growth patterns as they appear at the network level. This has the tangible result of capturing malware in a pristine state (though often packed). By intercepting the malware while it is transferred during infection prior to it reaching the target host, the captured malware cannot benefit from the complexity of obfuscation and dispersion, which occurs during installation on a target system.","PeriodicalId":130933,"journal":{"name":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126327630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Information Assurance Using a Defense In-Depth Strategy 使用纵深防御策略的信息保障
Kevin Dauch, Adam Hovak, Roger Nestler
{"title":"Information Assurance Using a Defense In-Depth Strategy","authors":"Kevin Dauch, Adam Hovak, Roger Nestler","doi":"10.1109/CATCH.2009.25","DOIUrl":"https://doi.org/10.1109/CATCH.2009.25","url":null,"abstract":"Information assurance is an essential part of data dissemination and requires availability, integrity, authentication, confidentiality and non-repudiation of information systems. A defense in depth security architecture will protect data in motion, data at rest and data at the edge. This paper discusses those various states of data, their vulnerabilities and a set of solutions that have been developed to aid in the overall protection of assets. The solution provided involves leveraging several technologies including: LevelLock, PuriFile and SINBAD. The combination of these products create a framework that can both proactively and reactively ensure data assets are created, modified and transferred in a consistent manner, based on policy. An organization seeking to fully protect its information resources should seek to implement a multi-strategy defense congruous with the solution provided here.","PeriodicalId":130933,"journal":{"name":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130868154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
SLINGbot: A System for Live Investigation of Next Generation Botnets SLINGbot:下一代僵尸网络的实时调查系统
A. Jackson, D. Lapsley, Christine E. Jones, M. Zatko, Chaos Golubitsky, W. Strayer
{"title":"SLINGbot: A System for Live Investigation of Next Generation Botnets","authors":"A. Jackson, D. Lapsley, Christine E. Jones, M. Zatko, Chaos Golubitsky, W. Strayer","doi":"10.1109/CATCH.2009.26","DOIUrl":"https://doi.org/10.1109/CATCH.2009.26","url":null,"abstract":"There is an urgent need for a pro-active approach to botnet detection and mitigation that will enable computer network defenders to characterize emerging and future botnet threats and design effective defense techniques before these threats materialize. To this end, we have developed a System for Live Investigation of Next Generation bots (SLINGbot). SLINGbot is an extensible, composable bot framework that enables researchers to construct benign bots for the purposes of generating and characterizing botnet Command and Control (C2) traffic. This enables researchers to simulate current and potential future botnet traffic, characterize it, and design effective defense techniques. In this paper, we describe the SLINGbot system and how it can be used for the pro-active development of botnet defenses.","PeriodicalId":130933,"journal":{"name":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133168879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Visual Analytics for Network Flow Analysis 可视化分析网络流量分析
J. Goodall, Daniel R. Tesone
{"title":"Visual Analytics for Network Flow Analysis","authors":"J. Goodall, Daniel R. Tesone","doi":"10.1109/CATCH.2009.47","DOIUrl":"https://doi.org/10.1109/CATCH.2009.47","url":null,"abstract":"Large corporations and government agencies are continually bombarded by malicious network attacks through the cyber infrastructure. One common method to identify and assess the impacts of these malicious activities is through the monitoring and analysis of network flow data. While already somewhat aggregated, the data can quickly become overwhelming – a billion flow records a day for large organizations is not abnormal. We have integrated our visual analytics toolkit with network flow data to provide a seamless workflow for computer network defense analysts. This integration can facilitate the learning process of novice analysts and make expert analysts more productive.","PeriodicalId":130933,"journal":{"name":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121715746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Internet Mapping: From Art to Science 互联网地图:从艺术到科学
K. Claffy, Young Hyun, K. Keys, Marina Fomenkov, D. Krioukov
{"title":"Internet Mapping: From Art to Science","authors":"K. Claffy, Young Hyun, K. Keys, Marina Fomenkov, D. Krioukov","doi":"10.1109/CATCH.2009.38","DOIUrl":"https://doi.org/10.1109/CATCH.2009.38","url":null,"abstract":"We are designing, implementing, deploying, and operating a secure measurement platform capable of performing various types of Internet infrastructure measurements and assessments. We integrate state-of-the-art measurement and analysis capabilities to try to build a coherent view of Internet topology. In September 2007 we began to use this novel architecture to support ongoing global Internet topology measurement and mapping, and are now gathering the largest set of IP topology data for use by academic researchers. We are using the best available techniques for IP topology mapping, and are developing some new techniques, as well as supporting software for data analysis, topology generation, and interactive visualization of resulting large annotated graphs. This paper presents our current results, next steps, and future goals.","PeriodicalId":130933,"journal":{"name":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129956163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 157
A Survey of Botnet Technology and Defenses 僵尸网络技术与防御综述
Michael Bailey, Evan Cooke, F. Jahanian, Yunjing Xu, M. Karir
{"title":"A Survey of Botnet Technology and Defenses","authors":"Michael Bailey, Evan Cooke, F. Jahanian, Yunjing Xu, M. Karir","doi":"10.1109/CATCH.2009.40","DOIUrl":"https://doi.org/10.1109/CATCH.2009.40","url":null,"abstract":"Global Internet threats have undergone a profound transformation from attacks designed solely to disable infrastructure to those that also target people and organizations. At the center of many of these attacks are collections of compromised computers, or Botnets, remotely controlled by the attackers, and whose members are located in homes, schools, businesses, and governments around the world [6]. In this survey paper we provide a brief look at how existing botnet research, the evolution and future of botnets, as well as the goals and visibility of today’s networks intersect to inform the field of botnet technology and defense.","PeriodicalId":130933,"journal":{"name":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114534432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 275
Inter-Network Operations Center Dial-by-ASN (INOC-DBA), a Resource for the Network Operator Community 网络运营商社区的资源——网络运营中心按asn拨号(INOC-DBA)
R. Stapleton-Gray
{"title":"Inter-Network Operations Center Dial-by-ASN (INOC-DBA), a Resource for the Network Operator Community","authors":"R. Stapleton-Gray","doi":"10.1109/CATCH.2009.36","DOIUrl":"https://doi.org/10.1109/CATCH.2009.36","url":null,"abstract":"INOC-DBA is a voice-over-Internet-Protocol (VoIP) hotline, first deployed by Packet Clearing House in 2002 and used by the global Internet network operations center (NOC) community. The system uses autonomous system numbers (ASNs) as “phone numbers,” i.e., when operators see traffic of concern, using the ASN of its system of origin routes the call to the party responsible for that system. PCH is currently working to enhance INOC-DBA functionality on four fronts: authentication, availability, use of system generated data for analysis, and bridging INOC-DBA to new resources and complementary systems.","PeriodicalId":130933,"journal":{"name":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124349764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Information-Flow Aware Virtual Machines: Foundations for Trustworthy Computing 信息流感知虚拟机:可信计算的基础
M. Franz
{"title":"Information-Flow Aware Virtual Machines: Foundations for Trustworthy Computing","authors":"M. Franz","doi":"10.1109/CATCH.2009.45","DOIUrl":"https://doi.org/10.1109/CATCH.2009.45","url":null,"abstract":"Many software systems in use today have enormous trusted computing bases (TCBs). We propose an architecture that makes it possible to shrink the TCB of many such systems. Our solution is based on a virtual-machine (VM) with added information-flow capabilities. In our architecture, all application programs run outside of the TCB under the control of the VM and cannot cause information leaks even if they try. We have implemented a prototype of this architecture and found that the resulting run-time overhead is much lower than expected. In many deployment contexts, it will be perfectly reasonable to make such a moderate performance sacrifice for the benefit of security.","PeriodicalId":130933,"journal":{"name":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117131902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deploying DNS Security (DNSSEC) in Large-Scale Operational Environments DNSSEC (DNS Security)在大规模业务环境中的部署
Joseph Gersch, D. Massey
{"title":"Deploying DNS Security (DNSSEC) in Large-Scale Operational Environments","authors":"Joseph Gersch, D. Massey","doi":"10.1109/CATCH.2009.43","DOIUrl":"https://doi.org/10.1109/CATCH.2009.43","url":null,"abstract":"The Domain Name System (DNS) is used by virtually every Internet application, but has virtually no security. The DNS Security Extensions (DNSSEC) add essential authentication, but deploying DNSSEC in a large-scale environment is non-trivial. This paper examines the operational and technological considerations when DNS operators manage a largescale deployment, such as an ISP with tens of thousands of zones, or a top-level domain that manages millions of domain name resource records.","PeriodicalId":130933,"journal":{"name":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","volume":"382 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120968217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信