Proceedings of the 11th International Conference on Security of Information and Networks最新文献

筛选
英文 中文
A Conceptual Framework To Identify Cyber Risks Associated With The Use Of Public Cloud Computing 识别与使用公共云计算相关的网络风险的概念框架
D. Bird
{"title":"A Conceptual Framework To Identify Cyber Risks Associated With The Use Of Public Cloud Computing","authors":"D. Bird","doi":"10.1145/3264437.3264466","DOIUrl":"https://doi.org/10.1145/3264437.3264466","url":null,"abstract":"There are a number of methods of abstraction used in public cloud computing models today. Successive incidents involving cloud customer instantiations reveal that either the security risks are difficult to comprehend, or customers' requisite security responsibilities are not fully understood. A pretext to this paper is an argument that there has been an over-reliance upon: (a) compliance mapping by customers that can hide technical complexities and the associated technical risks, or (b) risk assessment methods that pre-date cloud. The transition to a Cloud 2.0 era offers us an opportunity to re-think architecture and also to re-calibrate security approaches in order to better understand the risks. A Conceptual Framework has been derived for this purpose and proposed as a mechanism to contextualise public cloud risks.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130178966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Applying Deep Learning and Vector Representation for Software Vulnerabilities Detection 应用深度学习和向量表示进行软件漏洞检测
A. Pechenkin, R. Demidov
{"title":"Applying Deep Learning and Vector Representation for Software Vulnerabilities Detection","authors":"A. Pechenkin, R. Demidov","doi":"10.1145/3264437.3264489","DOIUrl":"https://doi.org/10.1145/3264437.3264489","url":null,"abstract":"This paper 1 addresses a problem of vulnerability detection in software represented as assembly code. An extended approach to the vulnerability detection problem is proposed. This work concentrates on improvement of neural network-based approach described in previous works of authors. The authors propose to include the morphology of instructions in vector representations. The bidirectional recurrent neural network is used with access to the execution traces of the program. This has significantly improved the vulnerability detecting accuracy.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"389 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122178552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Development of a Protection System for a Group of Mobile Robots, Taking into Account the Requirements of Foreign and Russian Legislation 考虑到外国和俄罗斯立法的要求,开发一组移动机器人的保护系统
M. Pismensky, E. Basan, O. Makarevich
{"title":"Development of a Protection System for a Group of Mobile Robots, Taking into Account the Requirements of Foreign and Russian Legislation","authors":"M. Pismensky, E. Basan, O. Makarevich","doi":"10.1145/3264437.3264469","DOIUrl":"https://doi.org/10.1145/3264437.3264469","url":null,"abstract":"The article deals with the application of FSTEC № 31 dated March 14, 2014 to the system consisting of mobile unmanned mobile robots and the operator's workplace. The article compares with other standards in the field of information security. After that, the system of mobile robots is classified and the choice of measures for the protection of information takes place. The implementation of these measures and the analysis of this implementation are shown below. At the end, a conclusion was drawn on the application of FSTEC № 31 to such systems.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122660967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of the Anomaly Detection Method for a Group of Mobile Robots 一组移动机器人异常检测方法的研究
E. Basan, O. Makarevich, A. Basan
{"title":"Development of the Anomaly Detection Method for a Group of Mobile Robots","authors":"E. Basan, O. Makarevich, A. Basan","doi":"10.1145/3264437.3264475","DOIUrl":"https://doi.org/10.1145/3264437.3264475","url":null,"abstract":"This article studied the attacks that can be implemented in a network of mobile robots. The peculiarity of these attacks is that they, as a rule, use the vulnerabilities of wireless data transmission and the weakness of network protocols. The study was carried out using a simulation model of a group of mobile robots. It was modeled following attacks: denial of service, Black-Hole, Gray-Hole. In this case, it was analyzed the impact of the attacks on the energy consumption and the impact on network traffic. It was assessed the complexity of the implementation of various types of attacks. This analysis should make it clear with what intensity the attack should be conducted in order to damage the network. Also in this study, a method is proposed for calculating the trust of network nodes and the entire network as a whole based on the number of discarded packets.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131888874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trapdoor-indistinguishable Secure Channel Free Public Key Encryption with Multi-Keywords Search (Student Contributions) 多关键词搜索的活板门不可区分安全通道自由公钥加密(学生投稿)
Yang Ma, H. Kazemian
{"title":"Trapdoor-indistinguishable Secure Channel Free Public Key Encryption with Multi-Keywords Search (Student Contributions)","authors":"Yang Ma, H. Kazemian","doi":"10.1145/3264437.3264465","DOIUrl":"https://doi.org/10.1145/3264437.3264465","url":null,"abstract":"Public Key Encryption with Keyword Search (PEKS) enables users to search encrypted messages by a specific keyword without compromising the original data security. Traditional PEKS schemes allow users to search one keyword only instead of multiple keywords. Therefore, these schemes may not be applied in practice. Besides, some PEKS schemes are vulnerable to Keyword Guessing Attack (KGA). This paper formally defines a concept of Trapdoor-indistinguishable Secure Channel Free Public Key Encryption with Multi-Keywords Search (tSCF-MPEKS) and then presents a concrete construction of tSCF-MPEKS. The proposed scheme solves multiple keywords search problem and satisfies the properties of Ciphertext Indistinguishability and Trapdoor Indistinguishability. Its security is semantic security in the random oracle models under Bilinear Diffle-Hellman (BDH) and 1-Bilinear Diffie-Hellman Inversion (1-BDHI) assumptions so that it is able to resist KGA.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121727727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SCADA Networks Anomaly-based Intrusion Detection System 基于SCADA网络异常的入侵检测系统
Abdulaziz Almehmadi
{"title":"SCADA Networks Anomaly-based Intrusion Detection System","authors":"Abdulaziz Almehmadi","doi":"10.1145/3264437.3264471","DOIUrl":"https://doi.org/10.1145/3264437.3264471","url":null,"abstract":"Intentional attacks1 that cause country wide blackouts, gas and water systems malfunction are actions that can be carried out by a nation to impact on another nation in a mean of war. Supervisory control and data acquisition (SCADA) networks that allow for communication for the utilities companies were designed with no security in mind causing the systems that a nation relies on to fall vulnerable to exploitation. Since SCADA networks are static in nature with pre-defined signatures of network traffic, we propose to design an anomaly-based intrusion detection system to detect abnormality in SCADA network traffic and protocols. We gather normal SCADA network traffic via tapping on the network for 30 days and then attack the network using Denial of Service (DoS) attack, message spoofing attack and man-in-the middle attack. We then train a classifier with two classes, normal and abnormal and report the classifier accuracy in detecting abnormal SCADA network traffic.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114076856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Developments in State Level Cyber Wargaming 国家级网络战推演的发展
J. Curry, Nick Drage
{"title":"Developments in State Level Cyber Wargaming","authors":"J. Curry, Nick Drage","doi":"10.1145/3264437.3264468","DOIUrl":"https://doi.org/10.1145/3264437.3264468","url":null,"abstract":"Cyber wargaming is an important part of preparations for cyber defense and offense. Current games have taken one of two forms: 'Capture the flag' type exercises, usually designed to train network administrators; and umpired manual tabletop or committee games during which the umpire arbitrates outcomes using methods of 'free' kriegsspiels wargaming. The former method is technically focused but usually not representative of real technical challenges and responses. The latter method suffers from the lack of umpires with relevant experience to drive the game narrative in a realistic manner. Our research is developing historical benchmarks and templates to introduce into manual games essential details of cyber-attacks and defense. The aim is to create a more plausible cyber wargame and one more useful for education and exploration of this critical issue.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130013243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed E-Voting System Based On Blind Intermediaries Using Homomorphic Encryption 基于盲中介的同态加密分布式电子投票系统
L. Babenko, I. Pisarev
{"title":"Distributed E-Voting System Based On Blind Intermediaries Using Homomorphic Encryption","authors":"L. Babenko, I. Pisarev","doi":"10.1145/3264437.3264473","DOIUrl":"https://doi.org/10.1145/3264437.3264473","url":null,"abstract":"The development of electronic voting systems is an important direction of work due to the ubiquitous transfer of all spheres of human activity to the information technology environment. Electronic voting in comparison with traditional methods of voting has a lower cost, more reliable and convenient in the context of the modern world. We present a distributed electronic voting system that uses an intermediary site to verify the correctness of components, which does not process any information about votes and user authentication data, as well as using the principle of blind intermediaries to ensure user authentication while maintaining their anonymity. In addition, we use the principle of homomorphic encryption and the threshold scheme for sharing the secret at the most important stage - the counting of votes. The groups of people participating in voting are characterized by a degree of confidence in them. The architecture of the service is described by the components that interact in it. We describe the process of voting, which consists of several stages. Cryptographic protocols are used to transfer data between components, which are based on establishing a secure connection using security certificates and generating session keys. We use symmetric encryption in CBC mode using random numbers and HMAC to ensure security in the form of party authentication, integrity control, and confidentiality during data transmission. The voting protocol supports the re-voting function. We describe the algorithms for counting votes based on the use of homomorphic encryption, distributed computations, and the threshold secret sharing scheme. We also describe the procedure for verifying votes after counting.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126251229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Applying deep learning techniques for Android malware detection 应用深度学习技术检测Android恶意软件
P. D. Zegzhda, D. Zegzhda, E. Pavlenko, G. Ignatev
{"title":"Applying deep learning techniques for Android malware detection","authors":"P. D. Zegzhda, D. Zegzhda, E. Pavlenko, G. Ignatev","doi":"10.1145/3264437.3264476","DOIUrl":"https://doi.org/10.1145/3264437.3264476","url":null,"abstract":"This article explores the use of deep learning for malware identification in the Android operating system. Similar studies are considered and, based on their drawbacks, a self-designed approach is proposed for representing an Android application for a convolutional neural network, which consists in constructing an RGB image, the pixels of which are formed from a sequence of pairs of API calls and protection levels. The results of the experimental evaluation of the proposed approach, which are presented in this paper, demonstrate its high efficiency for solving the problem of identifying malicious Android applications.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130468057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Synthetic datasets generation for intrusion detection in VANET 基于VANET的入侵检测合成数据集生成
V. Belenko, V. Krundyshev, M. Kalinin
{"title":"Synthetic datasets generation for intrusion detection in VANET","authors":"V. Belenko, V. Krundyshev, M. Kalinin","doi":"10.1145/3264437.3264479","DOIUrl":"https://doi.org/10.1145/3264437.3264479","url":null,"abstract":"Inter-car network -- a VANET (vehicular adhoc network) -- enables wireless communication between vehicles (V2V) and vehicle-to-infrastructure (V2X). The main goal of VANET is to render safety and convenience on the road. VANET differs from traditional networks due to its unique characteristics such as a high speed of hosts movement, a quickly changing topology, a frequent installation and disconnection of communication links. For a lack of infrastructure and centralized management, it becomes vulnerable to misbehaviors that significantly threatens different aspects of the VANET security. VANET should provide adequate security measures for the protected cyberenvironment. One of the commonly known approaches to protect a network is an intrusion detection system (IDS) that inspects a behavior of traffic and network hosts looking for the signs of the security threats and generates the alarm for any detected security anomaly. To be effective, IDS has to be trained with an adequate dataset of samples of security threats, but such task-driven datasets have not been produced for VANET so far. This paper discusses our method of synthetic generating a dataset for VANET IDS. There is a generator that allows providing datasets applying a network simulator NS-3 when investigating various types of specific cyber attacks targeted at VANET. The paper presents the existing datasets, describes our method developed to solve the task, discusses the characteristics of the resulting dataset, and shows the outcomes of simulation. The synthetically generated datasets may be applied for training the machine learning-based VANET IDSs being used to detect security threats in new car-to-car adhoc networks.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115291523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信