{"title":"Real-Time Intrusion Detection Method Based on Bidirectional Access of Modbus/TCP Protocol","authors":"X. Xin, Cancheng Liu, Bin Wang","doi":"10.1145/3058060.3058069","DOIUrl":"https://doi.org/10.1145/3058060.3058069","url":null,"abstract":"The Modbus/TCP protocol is commonly used in the industrial control systems for communications between the human-machine interface and the industrial controllers. This paper proposes a real-time intrusion detection method based on bidirectional access of the Modbus/TCP protocol. The method doesnt require key observation that Modbus/TCP traffic to and from master device or slave device is periodic. Anomaly detection can be realized in time by the method after checking only two packets. And even though invader modifies the legal function code to another legal one in the packet from master device to slave device, the method can also figure it out. The test results show that the presented method has traits of timeliness, low false positive rate and low false negative rate.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117256012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Information Security Framework of Intelligent Connected Vehicle","authors":"Bowei Zou, Mingqiu Gao, Xiaochuan Cui","doi":"10.1145/3058060.3058064","DOIUrl":"https://doi.org/10.1145/3058060.3058064","url":null,"abstract":"This paper describes the definition and main technical characteristics of intelligent networked vehicles and reviews the current research situation of information security of intelligent networked vehicles at home and abroad. Furthermore, it summarizes the relevant significant research achievements abroad and analyses the information security cases of intelligent network in recent years. The characteristics and attack path of information security vulnerabilities is analyzed. According to the security threat of onboard information system and the function requirement of vehicle system, the network security information model of intelligent vehicle network is proposed according to the future vehicle networking environment, and the future research direction is pointed out.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"153 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133946252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attribute-based Access Control with Dynamic Trust in a Hybrid Cloud Computing Environment","authors":"Zhiyuan Zhao, Lei Sun","doi":"10.1145/3058060.3058062","DOIUrl":"https://doi.org/10.1145/3058060.3058062","url":null,"abstract":"Cloud computing technology has become another revolution of information technology after the Internet due to their advantages of dynamic extensions, on-demand services, and charging by volume. The hybrid cloud, as a kind of the cloud computing, has broad application prospects, it is of great significance to information construction of our country. In order to improve scalability and to restrain cheating of resource sharing this paper proposed an attribute-based access control with dynamic trust (DT-ABAC) according to the characteristics of hybrid cloud computing environment. In the access control model, access request is described by the subject attribute, resource attribute, permission attribute, environmental and trust attributes, and access decision is based on the attribute information of the access request with the dynamic and fine-grained authorization mechanism, and the model has the better flexibility and scalability. At the same time, the model extends the trust attribute, and we research in some detail the related algorithms of the trust attribute to reach the aim of enhancing the scalability of resource sharing and preventing fraud. Finally, the simulation experiments show that the proposed model can achieve access control effectively and has better performance.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130941422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Defense Method against Docker Escape Attack","authors":"Zhiqiang Jian, Long Chen","doi":"10.1145/3058060.3058085","DOIUrl":"https://doi.org/10.1145/3058060.3058085","url":null,"abstract":"As one of the main technologies to support the virtualization of cloud computing, Docker has the characteristics of fast and lightweight virtualization on operating system-level,and is widely used in a variety of cloud platforms. Docker is faced with the risk of attacks that exploit kernel vulnerability by malicious users, once the exploit program in the container launches an effective escape attack can gain root privilege of the host, which will affect the reliability of other containers and the entire system. This paper discusses the existing security mechanism and security issues of Docker, summarize the methods and characteristics of Docker escape attack. And propose a defense method based on status inspection of namespaces, which is proved to be able to detect anomalous processes and prevent escape behaviors.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122375300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Nonrepudiable Threshold Proxy Signature Scheme against Forgery Attack","authors":"Danni Liu, Lijuan Wang, Can Wang, Pengyuan Huo","doi":"10.1145/3058060.3058086","DOIUrl":"https://doi.org/10.1145/3058060.3058086","url":null,"abstract":"Since the first (t, n) threshold proxy signature scheme was proposed, a great deal of work has been done. To avoid dispute, it is necessary to identify the actual signer who generates the proxy signature. To withstand the forgery attack that the original signer can forge a valid threshold proxy signature on behalf of the proxy group, this paper proposed a new scheme which is more secure and efficient. The new scheme is able to resist the forgery attack which relies on the hardness of computational discrete logarithm problem. Furthermore, the original signer only computes a common proxy share and broadcasts it to the proxy group. So that, it is more efficient in terms of computational complexity and communication cost.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"277 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131613070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Packet Leak Detection on Hardware-Trojan Infected NoCs for MPSoC Systems","authors":"Mubashir Hussain, Hui Guo","doi":"10.1145/3058060.3058061","DOIUrl":"https://doi.org/10.1145/3058060.3058061","url":null,"abstract":"Packet leak on network-on-chip (NoC) is one of the key security concerns in the MPSoC design, where the NoC of the system can come from a third-party vendor and can be illegitimately implanted with hardware trojans. Those trojans are usually small so that they can escape the scrutiny of circuit level testing and perform attacks when activated. This paper targets the trojan that leaks packets to malicious applications by altering the packet source and destination addresses. To detect such a packet leak, we present a cost effective authentication design where the packet source and destination addresses are tagged with a dynamic random value and the tag is scrambled with the packet data. Our design has two features: 1) If the adversary attempts to play with tag to escape detection, the data in the packet may likely be changed -- hence invalidating the leaked packet; 2) If the attacker only alters the packet addresses without twiddling tag in the packet, the attack will be100% detected.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128091851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Ding, Zidong Hua, Patrick Li, Qiushi Gong, Yuxi Cheng
{"title":"Botnet Host Detection Based on Heartbeat Association","authors":"W. Ding, Zidong Hua, Patrick Li, Qiushi Gong, Yuxi Cheng","doi":"10.1145/3377644.3377653","DOIUrl":"https://doi.org/10.1145/3377644.3377653","url":null,"abstract":"As a common means of communication, heartbeat is often used by the network applications. Hosts with the same heartbeat tend to have the same applications and thus share the homogenous vulnerabilities. Based on the detected heartbeat, the paper designs the heartbeat network, the heartbeat associated graph and an attribute propagation algorithm based on the heartbeat associated graph. The paper takes the distributed denial of service (DDoS) malicious host information provided by the intrusion detection system (IDS) deployed on the boundary of China education and research network (CERNET) Nanjing master node network as attribution, and constructs the associated graph based on the user datagram protocol (UDP) heartbeat detection result at the same location. The attribute propagation algorithm was tested for 17 days. And The result shows that the method can effectively detect DDoS malicious hosts that are not located by IDS.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116777571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Trust Management Model for Internet of Vehicles","authors":"Yonghao Wang","doi":"10.1145/3377644.3377664","DOIUrl":"https://doi.org/10.1145/3377644.3377664","url":null,"abstract":"With the continuous development of automatic driving technology, the application scenarios of Internet of Vehicles are more and more abundant, but it also faces more and more security threats. The problem that the identity of the vehicle is real but difficult to guarantee the reliability of interaction and the truth of shared information can be solved by using trust management technology. By deeply analyzing the main characteristics of trust management in Internet of Vehicles, a trust model suitable for Internet of Vehicles is proposed. The model takes the owner's offline social relationship as the basis for setting the initial trust of vehicle nodes, evaluates the direct trust based on the instant evaluation of satisfaction after interaction, and satisfies the rapid decision-making of the vehicles by limiting the length of the recommendation path when evaluating the recommendation trust. The simulation experiment shows that the model can help to establish stable and reliable trust relationship among the vehicles, and reduce the risk of value imbalance attack and collusion attack in trust management.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121736370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The APT Detection Method based on Attack Tree for SDN","authors":"Shande Jia, Yali Xu","doi":"10.1145/3199478.3199481","DOIUrl":"https://doi.org/10.1145/3199478.3199481","url":null,"abstract":"SDN with centralized control is more vulnerable to suffer from APT than traditional network. To accurately detect the APT that the SDN may suffer from, this paper proposes the APT detection method based on attack tree for SDN. Firstly, after deeply analyzing the process of APT in SDN, we establish APT attack model based on attack tree. Then, correlation analysis of attack behavior that detected by multiple detection methods to get attack path. Finally, the attack path match the APT attack model to judge whether there is an APT in SDN. Experiment shows that the method is more accurate to detect APT in SDN, and less overhead.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116680793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}