International Conference on Cryptography, Security and Privacy最新文献

筛选
英文 中文
Real-Time Intrusion Detection Method Based on Bidirectional Access of Modbus/TCP Protocol 基于Modbus/TCP协议双向访问的实时入侵检测方法
International Conference on Cryptography, Security and Privacy Pub Date : 2017-03-17 DOI: 10.1145/3058060.3058069
X. Xin, Cancheng Liu, Bin Wang
{"title":"Real-Time Intrusion Detection Method Based on Bidirectional Access of Modbus/TCP Protocol","authors":"X. Xin, Cancheng Liu, Bin Wang","doi":"10.1145/3058060.3058069","DOIUrl":"https://doi.org/10.1145/3058060.3058069","url":null,"abstract":"The Modbus/TCP protocol is commonly used in the industrial control systems for communications between the human-machine interface and the industrial controllers. This paper proposes a real-time intrusion detection method based on bidirectional access of the Modbus/TCP protocol. The method doesnt require key observation that Modbus/TCP traffic to and from master device or slave device is periodic. Anomaly detection can be realized in time by the method after checking only two packets. And even though invader modifies the legal function code to another legal one in the packet from master device to slave device, the method can also figure it out. The test results show that the presented method has traits of timeliness, low false positive rate and low false negative rate.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117256012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Information Security Framework of Intelligent Connected Vehicle 智能网联汽车信息安全框架研究
International Conference on Cryptography, Security and Privacy Pub Date : 2017-03-17 DOI: 10.1145/3058060.3058064
Bowei Zou, Mingqiu Gao, Xiaochuan Cui
{"title":"Research on Information Security Framework of Intelligent Connected Vehicle","authors":"Bowei Zou, Mingqiu Gao, Xiaochuan Cui","doi":"10.1145/3058060.3058064","DOIUrl":"https://doi.org/10.1145/3058060.3058064","url":null,"abstract":"This paper describes the definition and main technical characteristics of intelligent networked vehicles and reviews the current research situation of information security of intelligent networked vehicles at home and abroad. Furthermore, it summarizes the relevant significant research achievements abroad and analyses the information security cases of intelligent network in recent years. The characteristics and attack path of information security vulnerabilities is analyzed. According to the security threat of onboard information system and the function requirement of vehicle system, the network security information model of intelligent vehicle network is proposed according to the future vehicle networking environment, and the future research direction is pointed out.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"153 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133946252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Attribute-based Access Control with Dynamic Trust in a Hybrid Cloud Computing Environment 混合云计算环境下基于属性的动态信任访问控制
International Conference on Cryptography, Security and Privacy Pub Date : 2017-03-17 DOI: 10.1145/3058060.3058062
Zhiyuan Zhao, Lei Sun
{"title":"Attribute-based Access Control with Dynamic Trust in a Hybrid Cloud Computing Environment","authors":"Zhiyuan Zhao, Lei Sun","doi":"10.1145/3058060.3058062","DOIUrl":"https://doi.org/10.1145/3058060.3058062","url":null,"abstract":"Cloud computing technology has become another revolution of information technology after the Internet due to their advantages of dynamic extensions, on-demand services, and charging by volume. The hybrid cloud, as a kind of the cloud computing, has broad application prospects, it is of great significance to information construction of our country. In order to improve scalability and to restrain cheating of resource sharing this paper proposed an attribute-based access control with dynamic trust (DT-ABAC) according to the characteristics of hybrid cloud computing environment. In the access control model, access request is described by the subject attribute, resource attribute, permission attribute, environmental and trust attributes, and access decision is based on the attribute information of the access request with the dynamic and fine-grained authorization mechanism, and the model has the better flexibility and scalability. At the same time, the model extends the trust attribute, and we research in some detail the related algorithms of the trust attribute to reach the aim of enhancing the scalability of resource sharing and preventing fraud. Finally, the simulation experiments show that the proposed model can achieve access control effectively and has better performance.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130941422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Defense Method against Docker Escape Attack 一种针对Docker逃逸攻击的防御方法
International Conference on Cryptography, Security and Privacy Pub Date : 2017-03-17 DOI: 10.1145/3058060.3058085
Zhiqiang Jian, Long Chen
{"title":"A Defense Method against Docker Escape Attack","authors":"Zhiqiang Jian, Long Chen","doi":"10.1145/3058060.3058085","DOIUrl":"https://doi.org/10.1145/3058060.3058085","url":null,"abstract":"As one of the main technologies to support the virtualization of cloud computing, Docker has the characteristics of fast and lightweight virtualization on operating system-level,and is widely used in a variety of cloud platforms. Docker is faced with the risk of attacks that exploit kernel vulnerability by malicious users, once the exploit program in the container launches an effective escape attack can gain root privilege of the host, which will affect the reliability of other containers and the entire system. This paper discusses the existing security mechanism and security issues of Docker, summarize the methods and characteristics of Docker escape attack. And propose a defense method based on status inspection of namespaces, which is proved to be able to detect anomalous processes and prevent escape behaviors.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122375300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
A Nonrepudiable Threshold Proxy Signature Scheme against Forgery Attack 一种抗伪造攻击的不可否认阈值代理签名方案
International Conference on Cryptography, Security and Privacy Pub Date : 2017-03-17 DOI: 10.1145/3058060.3058086
Danni Liu, Lijuan Wang, Can Wang, Pengyuan Huo
{"title":"A Nonrepudiable Threshold Proxy Signature Scheme against Forgery Attack","authors":"Danni Liu, Lijuan Wang, Can Wang, Pengyuan Huo","doi":"10.1145/3058060.3058086","DOIUrl":"https://doi.org/10.1145/3058060.3058086","url":null,"abstract":"Since the first (t, n) threshold proxy signature scheme was proposed, a great deal of work has been done. To avoid dispute, it is necessary to identify the actual signer who generates the proxy signature. To withstand the forgery attack that the original signer can forge a valid threshold proxy signature on behalf of the proxy group, this paper proposed a new scheme which is more secure and efficient. The new scheme is able to resist the forgery attack which relies on the hardness of computational discrete logarithm problem. Furthermore, the original signer only computes a common proxy share and broadcasts it to the proxy group. So that, it is more efficient in terms of computational complexity and communication cost.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"277 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131613070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Packet Leak Detection on Hardware-Trojan Infected NoCs for MPSoC Systems 针对MPSoC系统的硬件木马感染noc的数据包泄漏检测
International Conference on Cryptography, Security and Privacy Pub Date : 2017-03-17 DOI: 10.1145/3058060.3058061
Mubashir Hussain, Hui Guo
{"title":"Packet Leak Detection on Hardware-Trojan Infected NoCs for MPSoC Systems","authors":"Mubashir Hussain, Hui Guo","doi":"10.1145/3058060.3058061","DOIUrl":"https://doi.org/10.1145/3058060.3058061","url":null,"abstract":"Packet leak on network-on-chip (NoC) is one of the key security concerns in the MPSoC design, where the NoC of the system can come from a third-party vendor and can be illegitimately implanted with hardware trojans. Those trojans are usually small so that they can escape the scrutiny of circuit level testing and perform attacks when activated. This paper targets the trojan that leaks packets to malicious applications by altering the packet source and destination addresses. To detect such a packet leak, we present a cost effective authentication design where the packet source and destination addresses are tagged with a dynamic random value and the tag is scrambled with the packet data. Our design has two features: 1) If the adversary attempts to play with tag to escape detection, the data in the packet may likely be changed -- hence invalidating the leaked packet; 2) If the attacker only alters the packet addresses without twiddling tag in the packet, the attack will be100% detected.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128091851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Botnet Host Detection Based on Heartbeat Association 基于心跳关联的僵尸网络主机检测
International Conference on Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1145/3377644.3377653
W. Ding, Zidong Hua, Patrick Li, Qiushi Gong, Yuxi Cheng
{"title":"Botnet Host Detection Based on Heartbeat Association","authors":"W. Ding, Zidong Hua, Patrick Li, Qiushi Gong, Yuxi Cheng","doi":"10.1145/3377644.3377653","DOIUrl":"https://doi.org/10.1145/3377644.3377653","url":null,"abstract":"As a common means of communication, heartbeat is often used by the network applications. Hosts with the same heartbeat tend to have the same applications and thus share the homogenous vulnerabilities. Based on the detected heartbeat, the paper designs the heartbeat network, the heartbeat associated graph and an attribute propagation algorithm based on the heartbeat associated graph. The paper takes the distributed denial of service (DDoS) malicious host information provided by the intrusion detection system (IDS) deployed on the boundary of China education and research network (CERNET) Nanjing master node network as attribution, and constructs the associated graph based on the user datagram protocol (UDP) heartbeat detection result at the same location. The attribute propagation algorithm was tested for 17 days. And The result shows that the method can effectively detect DDoS malicious hosts that are not located by IDS.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116777571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Trust Management Model for Internet of Vehicles 面向车联网的信任管理模型
International Conference on Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1145/3377644.3377664
Yonghao Wang
{"title":"A Trust Management Model for Internet of Vehicles","authors":"Yonghao Wang","doi":"10.1145/3377644.3377664","DOIUrl":"https://doi.org/10.1145/3377644.3377664","url":null,"abstract":"With the continuous development of automatic driving technology, the application scenarios of Internet of Vehicles are more and more abundant, but it also faces more and more security threats. The problem that the identity of the vehicle is real but difficult to guarantee the reliability of interaction and the truth of shared information can be solved by using trust management technology. By deeply analyzing the main characteristics of trust management in Internet of Vehicles, a trust model suitable for Internet of Vehicles is proposed. The model takes the owner's offline social relationship as the basis for setting the initial trust of vehicle nodes, evaluates the direct trust based on the instant evaluation of satisfaction after interaction, and satisfies the rapid decision-making of the vehicles by limiting the length of the recommendation path when evaluating the recommendation trust. The simulation experiment shows that the model can help to establish stable and reliable trust relationship among the vehicles, and reduce the risk of value imbalance attack and collusion attack in trust management.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121736370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The APT Detection Method based on Attack Tree for SDN 基于攻击树的SDN APT检测方法
International Conference on Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1145/3199478.3199481
Shande Jia, Yali Xu
{"title":"The APT Detection Method based on Attack Tree for SDN","authors":"Shande Jia, Yali Xu","doi":"10.1145/3199478.3199481","DOIUrl":"https://doi.org/10.1145/3199478.3199481","url":null,"abstract":"SDN with centralized control is more vulnerable to suffer from APT than traditional network. To accurately detect the APT that the SDN may suffer from, this paper proposes the APT detection method based on attack tree for SDN. Firstly, after deeply analyzing the process of APT in SDN, we establish APT attack model based on attack tree. Then, correlation analysis of attack behavior that detected by multiple detection methods to get attack path. Finally, the attack path match the APT attack model to judge whether there is an APT in SDN. Experiment shows that the method is more accurate to detect APT in SDN, and less overhead.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116680793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信