2006 Securecomm and Workshops最新文献

筛选
英文 中文
An Infrastructure for Gaining Trust in Context Information 在上下文信息中获得信任的基础结构
2006 Securecomm and Workshops Pub Date : 2006-08-01 DOI: 10.1109/SECCOMW.2006.359543
F. Fransen, Sven Lachmund, J. Olk, Laurent Bussard
{"title":"An Infrastructure for Gaining Trust in Context Information","authors":"F. Fransen, Sven Lachmund, J. Olk, Laurent Bussard","doi":"10.1109/SECCOMW.2006.359543","DOIUrl":"https://doi.org/10.1109/SECCOMW.2006.359543","url":null,"abstract":"In order to use context information for security decisions it is desired to have confidence that context information really represents the actual context of an entity. Existing context-aware architectures that are able to acquire context information upon request by an application are not capable of gaining this confidence. We propose a new context-aware architecture that embeds a trust evaluation infrastructure to establish a trust relationship to the source of context information and to analyze and assess context information for its plausibility. The trust evaluation infrastructure is generic in the sense that it can be applied to various fields of application since the trust evaluation methods that are tailored to a specific field of application can be added and removed dynamically","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125135752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Work in Progress - Tracking Correlated Attacks in Enterprise Intranets through Lattices 正在进行的工作-通过格跟踪企业内部网中的相关攻击
2006 Securecomm and Workshops Pub Date : 2006-08-01 DOI: 10.1109/SECCOMW.2006.359570
Sule Simsek
{"title":"Work in Progress - Tracking Correlated Attacks in Enterprise Intranets through Lattices","authors":"Sule Simsek","doi":"10.1109/SECCOMW.2006.359570","DOIUrl":"https://doi.org/10.1109/SECCOMW.2006.359570","url":null,"abstract":"Tracking attacks caused by correlation between malicious hosts is a rapidly growing research area. In this work-in-progress paper, we propose a lattice-based visualization method to capture the correlation between malicious hosts in an enterprise internal network. We present the design of L-BIDS (lattice-based intrusion detection system) in which the nodes represent the causal and correlated properties of the network messages. In order to track the propagation of a distributed denial of service (DDoS) attack, L-BIDS nodes are highlighted with different colors based on their role within the attack. The colored structure of nodes in an L-BIDS lattice allow us to obtain a concise intrusion signature, therefore, simplifies the tracking of the propagation of the DDoS attack. In our preliminary L-BIDS model, the analysis of the network data is off-line","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127489503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc Networks Ad Hoc网络中存在恶意对手时增强良性用户合作
2006 Securecomm and Workshops Pub Date : 2006-08-01 DOI: 10.1109/SECCOMW.2006.359557
George Theodorakopoulos, J. Baras
{"title":"Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc Networks","authors":"George Theodorakopoulos, J. Baras","doi":"10.1109/SECCOMW.2006.359557","DOIUrl":"https://doi.org/10.1109/SECCOMW.2006.359557","url":null,"abstract":"Decentralized and unstructured networks are becoming more prevalent today (e.g. ad hoc networks). Like every network, they depend on the cooperation of their users to survive. However, each user does not necessarily know who the others are, or what their intentions are. Since there is no centralized infrastructure, the users can only base their decision on what they observe themselves. Ideally, they would like to cooperate only with users that have common interests with them. In this paper, we use a game theoretic model for the above situation. We assume there are only two kinds of users, good (benign) and bad (malicious). Good users receive a high game theoretic payoff when they cooperate with other good users, but a low payoff when they cooperate with bad users. We propose behavior rules (strategies) to achieve equilibria that enable as many good users as possible to cooperate with each other, and at the same time minimize the number of good-bad cooperations","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130821031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Enhancing Privacy Preservation of Anonymous Location Sampling Techniques in Traffic Monitoring Systems 加强交通监控系统中匿名位置采样技术的隐私保护
2006 Securecomm and Workshops Pub Date : 2006-08-01 DOI: 10.1109/SECCOMW.2006.359553
Baik Hoh, M. Gruteser, Hui Xiong, A. Alrabady
{"title":"Enhancing Privacy Preservation of Anonymous Location Sampling Techniques in Traffic Monitoring Systems","authors":"Baik Hoh, M. Gruteser, Hui Xiong, A. Alrabady","doi":"10.1109/SECCOMW.2006.359553","DOIUrl":"https://doi.org/10.1109/SECCOMW.2006.359553","url":null,"abstract":"Automotive traffic monitoring belongs to a class of applications that collect aggregate statistics from the location traces of a large number of users. A widely-accepted belief is that anonymization of individual records can address the privacy problem which such aggregate statistics might pose. However, in this paper, we show that data mining techniques, such as clustering, can reconstruct private information from such anonymous traces. To meet this new challenge, we propose enhanced privacy-preserving algorithm to control the release of location traces near origins/destinations and evaluate it using real-world GPS location traces","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"138 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128781053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A History-Based Framework to Build Trust Management Systems 基于历史的信任管理体系构建框架
2006 Securecomm and Workshops Pub Date : 2006-08-01 DOI: 10.1109/SECCOMW.2006.359580
S. Galice, V. Legrand, M. Minier, John Mullins, S. Ubéda
{"title":"A History-Based Framework to Build Trust Management Systems","authors":"S. Galice, V. Legrand, M. Minier, John Mullins, S. Ubéda","doi":"10.1109/SECCOMW.2006.359580","DOIUrl":"https://doi.org/10.1109/SECCOMW.2006.359580","url":null,"abstract":"In the context of ambient networks where each small device must trust its neighborhood rather than a fixed network, we propose in this paper a trust management framework based upon social patterns. As in human interactions model, our proposal build trust using history elements of past interactions with a local reputation model. The main features of our framework is the non transitivity of the trust bond and the non transferability of the history. The elements of history are also cryptographically proved as a criterion to enforce the trust notion. This gives a general framework that permits the implementation of various trust models","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128197672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient visualization of change events in enterprise networks 企业网络中变更事件的高效可视化
2006 Securecomm and Workshops Pub Date : 2006-08-01 DOI: 10.1109/SECCOMW.2006.359582
Andrew Stewart
{"title":"Efficient visualization of change events in enterprise networks","authors":"Andrew Stewart","doi":"10.1109/SECCOMW.2006.359582","DOIUrl":"https://doi.org/10.1109/SECCOMW.2006.359582","url":null,"abstract":"Change is a crucial property from a security perspective. The detection of change underpins many of the operational security activities that organizations typically carry out. For example, the essence of security monitoring is to detect changes, then analyze those changes in the context of the applicable security policy. Security tools are available to perform change detection at a host level. Such tools typically employ a local software agent, and identify changes that occur in the filesystem of the host. We describe a tool that performs a similar role in a network environment. The tool employs a variety of visualization techniques to efficiently communicate changes that occur in enterprise networks","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129995308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Customizable Reputation-based Privacy Assurance System using Active Feedback 使用主动反馈的可定制的基于声誉的隐私保证系统
2006 Securecomm and Workshops Pub Date : 2006-08-01 DOI: 10.1109/SECCOMW.2006.359575
S. Crane, M. C. Mont
{"title":"A Customizable Reputation-based Privacy Assurance System using Active Feedback","authors":"S. Crane, M. C. Mont","doi":"10.1109/SECCOMW.2006.359575","DOIUrl":"https://doi.org/10.1109/SECCOMW.2006.359575","url":null,"abstract":"People are often required to disclose personal identifying information (PII) in order to achieve their goals, e.g. when accessing services, obtaining information and goods, etc. Being able to say with absolute certainty that another party can be trusted to properly handle personal data with today's technology is probably unrealistic. Feedback solutions based on reputation mechanisms can address aspects of trust and assurance in relation to how personal data is managed by an enterprise. However they usually rely on subjective feedback which is based on empirical experiences, and typically they do not allow individuals to systematically track and manage their specific experience. In this paper we propose an approach that enables people to monitor the status of their personal data which they have previously shared with an enterprise, service provider or other organization - under specific conditions previously negotiated - and actively gather information on how adequately the management of these data meets their personal expectations. Ongoing monitoring and notification, and the ability of the client to form a simple record of past interaction, provides the client with greater confidence and assurance in situations where they need to share personal sensitive information with organizations they would otherwise not be able to claim they trust. This feedback process is based on conditions that are specific to the process of sharing PII and provides the client with assurance that an enterprise is a) capable and b) actually fulfilling PII processing preferences that are agreed at the time the data is disclosed, and which ultimately enables the client to form an opinion about the service provided. We present the principles of our approach and architectural components that support a practical implementation. This is work in progress and the research is on-going, carried out in the context of PRIME","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130722491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Work in Progress: Bro-LAN Pervasive Network Inspection and Control for LAN Traffic 正在进行的工作:兄弟局域网普适网络对局域网流量的检测和控制
2006 Securecomm and Workshops Pub Date : 2006-08-01 DOI: 10.1109/SECCOMW.2006.359568
N. Weaver, V. Paxson, Robin Sommer
{"title":"Work in Progress: Bro-LAN Pervasive Network Inspection and Control for LAN Traffic","authors":"N. Weaver, V. Paxson, Robin Sommer","doi":"10.1109/SECCOMW.2006.359568","DOIUrl":"https://doi.org/10.1109/SECCOMW.2006.359568","url":null,"abstract":"Network intrusion detection and prevention systems (NIDS and NIPS) have to date focused on protecting external access links, or, when internally deployed, links between major enclaves in an enterprise. As previously argued, major threats (worms, insiders, and attackers with a toehold) come from inside the local network, rather than outside. Recently, two approaches have arisen to address this threat: ubiquitous deployment of end system monitors and custom hardware to replace switching infrastructure. This paper presents a third way: exploiting the VLAN capabilities of modern switches to enforce that all LAN communications must traverse and meet the approval of an intrusion detection monitor that operates separately from the switches. This architecture can realize two key benefits: (1) deployment and operation in today's enterprise networks without requiring replacement of existing network infrastructure, and (2) the use of highly flexible, commodity PCs for LAN monitoring, rather than algorithms embedded in difficult-to-reprogram custom hardware","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114168661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Work in Progress: Who is Watching You? Video Conferencing Security 工作进展:谁在看着你?视频会议安全
2006 Securecomm and Workshops Pub Date : 2006-08-01 DOI: 10.1109/SECCOMW.2006.359573
N. Jam, Elliot Proebstel
{"title":"Work in Progress: Who is Watching You? Video Conferencing Security","authors":"N. Jam, Elliot Proebstel","doi":"10.1109/SECCOMW.2006.359573","DOIUrl":"https://doi.org/10.1109/SECCOMW.2006.359573","url":null,"abstract":"Our research shows that video conferencing systems are prone to a number of attacks which can result in the disclosure of sensitive information. This paper highlights some of those issues as well as providing recommendations to secure these devices","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128764518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Flow Anomaly Detection in Firewalled Networks 防火墙网络中的流量异常检测
2006 Securecomm and Workshops Pub Date : 2006-08-01 DOI: 10.1109/SECCOMW.2006.359576
M. Chapple, Timothy E. Wright, Robert M. Winding
{"title":"Flow Anomaly Detection in Firewalled Networks","authors":"M. Chapple, Timothy E. Wright, Robert M. Winding","doi":"10.1109/SECCOMW.2006.359576","DOIUrl":"https://doi.org/10.1109/SECCOMW.2006.359576","url":null,"abstract":"Most contemporary intrusion detection systems rely upon comprehensive signature databases containing the characteristics of known attacks, leaving them unable to detect novel attacks. In this paper, we propose the flow anomaly detection system (FADS), an anomaly detection system based upon the analysis of network flow data in controlled environments. We show that the standard deviation and interquartile range techniques produce a manageable number of alerts when applied to this data and demonstrate the effectiveness of the system through analysis of case studies. We also demonstrate that FADS' performance is sufficient to facilitate implementation as an anomaly detection system","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131264605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信