Proceedings of the 11th International Conference on Security of Information and Networks最新文献

筛选
英文 中文
Efficient Strong Key Indistinguishable Access Control in Dynamic Hierarchies with Constant Decryption Cost 具有恒定解密代价的动态层次结构中有效的强密钥不可区分访问控制
Gaurav Pareek, B. Purushothama
{"title":"Efficient Strong Key Indistinguishable Access Control in Dynamic Hierarchies with Constant Decryption Cost","authors":"Gaurav Pareek, B. Purushothama","doi":"10.1145/3264437.3264480","DOIUrl":"https://doi.org/10.1145/3264437.3264480","url":null,"abstract":"Hierarchical access control is for scenarios where some users have access to more organization data than others. In this paper, we propose an efficient key assignment scheme for dynamic hierarchies that features constant decryption cost and does not require any expensive operations like bilinear pairing. The proposed hierarchical key assignment scheme is secure against strong key distinguishability attacks. It also supports dynamic updates like addition and deletion of classes in the hierarchy with efficient procedures for preserving forward and backward secrecy. Another important highlight of the proposed scheme is that secret keys of none of the users have to be updated to preserve forward and backward secrecy in case of dynamic updates. Proposed is the first dynamic hierarchical key assignment scheme whose key derivation procedure has constant computation cost and is pairing-free with strong key indistinguishability.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131001516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implementation of Intelligent Agents for Network Traffic and Security Risk Analysis in Cyber-Physical Systems 网络物理系统中网络流量与安全风险分析智能代理的实现
Igor Kotenko, S. Ageev, I. Saenko
{"title":"Implementation of Intelligent Agents for Network Traffic and Security Risk Analysis in Cyber-Physical Systems","authors":"Igor Kotenko, S. Ageev, I. Saenko","doi":"10.1145/3264437.3264487","DOIUrl":"https://doi.org/10.1145/3264437.3264487","url":null,"abstract":"The paper offers an approach for implementation of intelligent agents intended for network traffic and security risk analysis in cyber-physical systems. The agents are based on the algorithm of pseudo-gradient adaptive anomaly detection and fuzzy logical inference. The suggested algorithm operates in real time. The fuzzy logical inference is used for regulation of algorithm parameters. The variants of the implementation are proposed. The experimental assessment of the approach confirms its high speed and adequate accuracy for network traffic analysis.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126653302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Proceedings of the 11th International Conference on Security of Information and Networks 第11届信息与网络安全国际会议论文集
{"title":"Proceedings of the 11th International Conference on Security of Information and Networks","authors":"","doi":"10.1145/3264437","DOIUrl":"https://doi.org/10.1145/3264437","url":null,"abstract":"submission:23 May, 2019 International Advisory Committee: • Xiantu He (Chair), IAPCM & Zhejiang University, China • Yuanping Feng, National University of Singapore, Singapore • Chi-Wang Shu, Brown University, USA • Choy Heng Lai, National University of Singapore, Singapore • Da Hsuan Feng, China Silk Road iValley Research Institute • Guoyong Fu, Zhejiang University • Hui PAN, University of Macau • Jisoon Ihm, POSTECH,Korea • Lev Shchur, Laudau Institute for Theoretical Physics, Russia • Remi Abgrall, University of Zurich, Switzerland • Shi Jin, University of Wisconsin, USA • Shi-Yi Chen, Southern University of Science and Technology of China • Steven G. Louie, University of California at Berkeley, USA • Tao Tang, Southern University of Science and Technology of China • Vijay Kumar, Foundation, India • Weiyan Zhang, China Academy of Engineering Physics, China Local Organizing Committee: • Zheng-Mao Sheng (Chair) Kai Wang (Co-Chair) • Bo Zheng Zhiwei Ma • Huichun Wu Qinghu Chen • Jingyuan Li Jianlan Wu • Jianbo Zhang J. Q. You","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115976897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection of packaged and encrypted PE files with the use of machine-learning algorithm 使用机器学习算法检测打包和加密的PE文件
R. Gevorgyan, E. Abramov
{"title":"Detection of packaged and encrypted PE files with the use of machine-learning algorithm","authors":"R. Gevorgyan, E. Abramov","doi":"10.1145/3264437.3264481","DOIUrl":"https://doi.org/10.1145/3264437.3264481","url":null,"abstract":"There were distinguished static and dynamic features of packaged and encrypted program files; a training sample is created on the basis of their co-delivery. Machine learning methods were used to build a classifier for detection of packaged or encrypted files.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124742050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Tool for Testing the Packet Analyzer of Network Attack Detection Systems 网络攻击检测系统包分析器测试软件工具
A. Branitskiy, Igor Kotenko
{"title":"Software Tool for Testing the Packet Analyzer of Network Attack Detection Systems","authors":"A. Branitskiy, Igor Kotenko","doi":"10.1145/3264437.3264488","DOIUrl":"https://doi.org/10.1145/3264437.3264488","url":null,"abstract":"The paper is devoted to a model, technique and software tool for testing network attack detection systems (ADSs) from the point of view of the correct functioning of their internal packet analyzer. A client-server architecture of the software tool for generating the low-level network attacks is described. The paper outlines the experimental results of testing several ADSs by using the implemented software tool. The results of experiments, aimed at testing the ADSs on the ability to detect evasion and insertion attacks, are presented. We analyze the reaction of ADSs in response to various network packets subjected to various transformations at the levels both of IP and TCP protocols. Recommendations aimed at detecting and preventing such situations in computer networks are proposed.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117328383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Architecture of the Software System for Adaptive Protection of Network Infrastructure 网络基础设施自适应保护软件系统的体系结构
D. Levonevskiy, L. Fedorchenko, I. Afanasieva, F. Novikov
{"title":"Architecture of the Software System for Adaptive Protection of Network Infrastructure","authors":"D. Levonevskiy, L. Fedorchenko, I. Afanasieva, F. Novikov","doi":"10.1145/3264437.3264467","DOIUrl":"https://doi.org/10.1145/3264437.3264467","url":null,"abstract":"The article considers an example of an adaptive protection system focused on protection from heterogeneous misinforming impacts to computer networks. The system adaptation to the current conditions is being performed by means of its reconfiguring. Reconfiguring implies adjusting particular blocks of the system to the current situation, as well as selecting appropriate methods of revealing false information in heterogeneous data. Reconfiguring is based on the automata objects model. As an example, data exchange TLS protocol is considered.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117205711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Bypass Biometric Lock Systems With Gelatin Artificial Fingerprint 用明胶人工指纹绕过生物识别锁系统
E. Maro, M. Kovalchuk
{"title":"Bypass Biometric Lock Systems With Gelatin Artificial Fingerprint","authors":"E. Maro, M. Kovalchuk","doi":"10.1145/3264437.3264439","DOIUrl":"https://doi.org/10.1145/3264437.3264439","url":null,"abstract":"The article describes a direct attack to bypass devices lock system by using fingerprint verification. We use method of creating a gelatin artificial fingerprints to bypass the locking system of smartphones, laptop and tablet. The experiment confirmed the possibility of bypassing fingerprint protection without the need for expensive tools or high-quality fingerprint samples. The artificial fingerprints were tested to unlock iPhone 6, iPhone 8, Samsung Galaxy S8 and Meizu m5s smartphones, COBO C2 USB Fingerprint Module, iPad Air 2, Schenker XMG A507 laptop. We obtained experimental data on the percentage of the probability to bypass fingerprint lock system for tested devices.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123197367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things 物联网RPL协议目标函数脆弱性评估
Felisberto Semedo, N. Moradpoor, Majid Rafiq
{"title":"Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things","authors":"Felisberto Semedo, N. Moradpoor, Majid Rafiq","doi":"10.1145/3264437.3264438","DOIUrl":"https://doi.org/10.1145/3264437.3264438","url":null,"abstract":"The Internet of Things (IoT) can be described as the ever-growing global network of objects with built-in sensing and communication interfaces such as sensors, Global Positioning devices (GPS) and Local Area Network (LAN) interfaces. Security is by far one of the biggest challenges in IoT networks. This includes secure routing which involves the secure creation of traffic routes and secure transmission of routed packets from a source to a destination. The Routing Protocol for Low-power and Lossy network (RPL) is one of the popular IoT's routing protocol that supports IPv6 communication. However, it suffers from having a basic system for supporting secure routing procedure which makes the RPL vulnerable to many attacks. This includes rank attack manipulation. Objective Function (OF) is one of the extreme importance features of RPL which influences an IoT network in terms of routing strategies as well as network topology. However, current literature lacks study of vulnerability analysis of OFs. Therefore, this paper aims to investigate the vulnerability assessment of OF of RPL protocol. For this, we focus on the rank attack manipulation and two popular OFs: Objective Function Zero (OF0) and the Minimum Rank with Hysteresis Objective Function (MRHOF).","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132263550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信