F. Fransen, Sven Lachmund, J. Olk, Laurent Bussard
{"title":"An Infrastructure for Gaining Trust in Context Information","authors":"F. Fransen, Sven Lachmund, J. Olk, Laurent Bussard","doi":"10.1109/SECCOMW.2006.359543","DOIUrl":"https://doi.org/10.1109/SECCOMW.2006.359543","url":null,"abstract":"In order to use context information for security decisions it is desired to have confidence that context information really represents the actual context of an entity. Existing context-aware architectures that are able to acquire context information upon request by an application are not capable of gaining this confidence. We propose a new context-aware architecture that embeds a trust evaluation infrastructure to establish a trust relationship to the source of context information and to analyze and assess context information for its plausibility. The trust evaluation infrastructure is generic in the sense that it can be applied to various fields of application since the trust evaluation methods that are tailored to a specific field of application can be added and removed dynamically","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125135752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Work in Progress - Tracking Correlated Attacks in Enterprise Intranets through Lattices","authors":"Sule Simsek","doi":"10.1109/SECCOMW.2006.359570","DOIUrl":"https://doi.org/10.1109/SECCOMW.2006.359570","url":null,"abstract":"Tracking attacks caused by correlation between malicious hosts is a rapidly growing research area. In this work-in-progress paper, we propose a lattice-based visualization method to capture the correlation between malicious hosts in an enterprise internal network. We present the design of L-BIDS (lattice-based intrusion detection system) in which the nodes represent the causal and correlated properties of the network messages. In order to track the propagation of a distributed denial of service (DDoS) attack, L-BIDS nodes are highlighted with different colors based on their role within the attack. The colored structure of nodes in an L-BIDS lattice allow us to obtain a concise intrusion signature, therefore, simplifies the tracking of the propagation of the DDoS attack. In our preliminary L-BIDS model, the analysis of the network data is off-line","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127489503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc Networks","authors":"George Theodorakopoulos, J. Baras","doi":"10.1109/SECCOMW.2006.359557","DOIUrl":"https://doi.org/10.1109/SECCOMW.2006.359557","url":null,"abstract":"Decentralized and unstructured networks are becoming more prevalent today (e.g. ad hoc networks). Like every network, they depend on the cooperation of their users to survive. However, each user does not necessarily know who the others are, or what their intentions are. Since there is no centralized infrastructure, the users can only base their decision on what they observe themselves. Ideally, they would like to cooperate only with users that have common interests with them. In this paper, we use a game theoretic model for the above situation. We assume there are only two kinds of users, good (benign) and bad (malicious). Good users receive a high game theoretic payoff when they cooperate with other good users, but a low payoff when they cooperate with bad users. We propose behavior rules (strategies) to achieve equilibria that enable as many good users as possible to cooperate with each other, and at the same time minimize the number of good-bad cooperations","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130821031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Privacy Preservation of Anonymous Location Sampling Techniques in Traffic Monitoring Systems","authors":"Baik Hoh, M. Gruteser, Hui Xiong, A. Alrabady","doi":"10.1109/SECCOMW.2006.359553","DOIUrl":"https://doi.org/10.1109/SECCOMW.2006.359553","url":null,"abstract":"Automotive traffic monitoring belongs to a class of applications that collect aggregate statistics from the location traces of a large number of users. A widely-accepted belief is that anonymization of individual records can address the privacy problem which such aggregate statistics might pose. However, in this paper, we show that data mining techniques, such as clustering, can reconstruct private information from such anonymous traces. To meet this new challenge, we propose enhanced privacy-preserving algorithm to control the release of location traces near origins/destinations and evaluate it using real-world GPS location traces","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"138 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128781053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Galice, V. Legrand, M. Minier, John Mullins, S. Ubéda
{"title":"A History-Based Framework to Build Trust Management Systems","authors":"S. Galice, V. Legrand, M. Minier, John Mullins, S. Ubéda","doi":"10.1109/SECCOMW.2006.359580","DOIUrl":"https://doi.org/10.1109/SECCOMW.2006.359580","url":null,"abstract":"In the context of ambient networks where each small device must trust its neighborhood rather than a fixed network, we propose in this paper a trust management framework based upon social patterns. As in human interactions model, our proposal build trust using history elements of past interactions with a local reputation model. The main features of our framework is the non transitivity of the trust bond and the non transferability of the history. The elements of history are also cryptographically proved as a criterion to enforce the trust notion. This gives a general framework that permits the implementation of various trust models","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128197672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient visualization of change events in enterprise networks","authors":"Andrew Stewart","doi":"10.1109/SECCOMW.2006.359582","DOIUrl":"https://doi.org/10.1109/SECCOMW.2006.359582","url":null,"abstract":"Change is a crucial property from a security perspective. The detection of change underpins many of the operational security activities that organizations typically carry out. For example, the essence of security monitoring is to detect changes, then analyze those changes in the context of the applicable security policy. Security tools are available to perform change detection at a host level. Such tools typically employ a local software agent, and identify changes that occur in the filesystem of the host. We describe a tool that performs a similar role in a network environment. The tool employs a variety of visualization techniques to efficiently communicate changes that occur in enterprise networks","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129995308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Customizable Reputation-based Privacy Assurance System using Active Feedback","authors":"S. Crane, M. C. Mont","doi":"10.1109/SECCOMW.2006.359575","DOIUrl":"https://doi.org/10.1109/SECCOMW.2006.359575","url":null,"abstract":"People are often required to disclose personal identifying information (PII) in order to achieve their goals, e.g. when accessing services, obtaining information and goods, etc. Being able to say with absolute certainty that another party can be trusted to properly handle personal data with today's technology is probably unrealistic. Feedback solutions based on reputation mechanisms can address aspects of trust and assurance in relation to how personal data is managed by an enterprise. However they usually rely on subjective feedback which is based on empirical experiences, and typically they do not allow individuals to systematically track and manage their specific experience. In this paper we propose an approach that enables people to monitor the status of their personal data which they have previously shared with an enterprise, service provider or other organization - under specific conditions previously negotiated - and actively gather information on how adequately the management of these data meets their personal expectations. Ongoing monitoring and notification, and the ability of the client to form a simple record of past interaction, provides the client with greater confidence and assurance in situations where they need to share personal sensitive information with organizations they would otherwise not be able to claim they trust. This feedback process is based on conditions that are specific to the process of sharing PII and provides the client with assurance that an enterprise is a) capable and b) actually fulfilling PII processing preferences that are agreed at the time the data is disclosed, and which ultimately enables the client to form an opinion about the service provided. We present the principles of our approach and architectural components that support a practical implementation. This is work in progress and the research is on-going, carried out in the context of PRIME","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130722491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Work in Progress: Bro-LAN Pervasive Network Inspection and Control for LAN Traffic","authors":"N. Weaver, V. Paxson, Robin Sommer","doi":"10.1109/SECCOMW.2006.359568","DOIUrl":"https://doi.org/10.1109/SECCOMW.2006.359568","url":null,"abstract":"Network intrusion detection and prevention systems (NIDS and NIPS) have to date focused on protecting external access links, or, when internally deployed, links between major enclaves in an enterprise. As previously argued, major threats (worms, insiders, and attackers with a toehold) come from inside the local network, rather than outside. Recently, two approaches have arisen to address this threat: ubiquitous deployment of end system monitors and custom hardware to replace switching infrastructure. This paper presents a third way: exploiting the VLAN capabilities of modern switches to enforce that all LAN communications must traverse and meet the approval of an intrusion detection monitor that operates separately from the switches. This architecture can realize two key benefits: (1) deployment and operation in today's enterprise networks without requiring replacement of existing network infrastructure, and (2) the use of highly flexible, commodity PCs for LAN monitoring, rather than algorithms embedded in difficult-to-reprogram custom hardware","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114168661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Work in Progress: Who is Watching You? Video Conferencing Security","authors":"N. Jam, Elliot Proebstel","doi":"10.1109/SECCOMW.2006.359573","DOIUrl":"https://doi.org/10.1109/SECCOMW.2006.359573","url":null,"abstract":"Our research shows that video conferencing systems are prone to a number of attacks which can result in the disclosure of sensitive information. This paper highlights some of those issues as well as providing recommendations to secure these devices","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128764518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flow Anomaly Detection in Firewalled Networks","authors":"M. Chapple, Timothy E. Wright, Robert M. Winding","doi":"10.1109/SECCOMW.2006.359576","DOIUrl":"https://doi.org/10.1109/SECCOMW.2006.359576","url":null,"abstract":"Most contemporary intrusion detection systems rely upon comprehensive signature databases containing the characteristics of known attacks, leaving them unable to detect novel attacks. In this paper, we propose the flow anomaly detection system (FADS), an anomaly detection system based upon the analysis of network flow data in controlled environments. We show that the standard deviation and interquartile range techniques produce a manageable number of alerts when applied to this data and demonstrate the effectiveness of the system through analysis of case studies. We also demonstrate that FADS' performance is sufficient to facilitate implementation as an anomaly detection system","PeriodicalId":156828,"journal":{"name":"2006 Securecomm and Workshops","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131264605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}