2014 7th International Conference on Security Technology最新文献

筛选
英文 中文
Security Objectives of Cyber Physical Systems 网络物理系统的安全目标
2014 7th International Conference on Security Technology Pub Date : 2014-12-20 DOI: 10.1109/SECTECH.2014.15
Tianbo Lu, Jinyang Zhao, Lingling Zhao, Yang Li, Xiaoyan Zhang
{"title":"Security Objectives of Cyber Physical Systems","authors":"Tianbo Lu, Jinyang Zhao, Lingling Zhao, Yang Li, Xiaoyan Zhang","doi":"10.1109/SECTECH.2014.15","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.15","url":null,"abstract":"Today, cyber physical systems (CPS) are ubiquitous in power networks, healthcare devices, transportation networks, industrial process and infrastructures. Security of cyber physical systems has become the utmost important concern in system design, implementation and research. For the past few years, researchers are focus their researches on different aspects of security of cyber physical systems. In this paper, we present a comprehensive review on up-to-now security research of cyber physical systems. We analyze main universities and institutes studying CPS security objectives.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125587429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Analysis of Attacks against Anonymous Communication Networks 针对匿名通信网络的攻击分析
2014 7th International Conference on Security Technology Pub Date : 2014-12-20 DOI: 10.1109/SECTECH.2014.17
Tianbo Lu, Puxin Yao, Lingling Zhao, Yang Li, Feng Xie, Yamei Xia
{"title":"An Analysis of Attacks against Anonymous Communication Networks","authors":"Tianbo Lu, Puxin Yao, Lingling Zhao, Yang Li, Feng Xie, Yamei Xia","doi":"10.1109/SECTECH.2014.17","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.17","url":null,"abstract":"Anonymous communication system has been hot topic in the field of information security, and attack techniques against anonymous systems are endless. This paper classifies and summarizes the study of attacks against anonymous communication system in recent years, including passive attacks and active attacks.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"114 24","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113946016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Empirical Study of Dimensionality Reduction Methods for Biometric Recognition 生物特征识别降维方法的实证研究
2014 7th International Conference on Security Technology Pub Date : 2014-12-20 DOI: 10.1109/SECTECH.2014.14
Nittaya Kerdprasop, Ratiporn Chanklan, Anusara Hirunyawanakul, Kittisak Kerdprasop
{"title":"An Empirical Study of Dimensionality Reduction Methods for Biometric Recognition","authors":"Nittaya Kerdprasop, Ratiporn Chanklan, Anusara Hirunyawanakul, Kittisak Kerdprasop","doi":"10.1109/SECTECH.2014.14","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.14","url":null,"abstract":"This research aims at studying the recognition accuracy and execution time that are affected by different dimensionality reduction methods applied to the biometric image data. We comparatively study the fingerprint, face images, and handwritten signature data that are pre-processed with the two statistical based dimensionality reduction methods: principal component analysis (PCA) and linear discriminant analysis (LDA). The algorithm that has been used to train and recognize the images is support vector machine with linear and polynomial kernel functions. Experimental results showed that the application of LDA dimensionality reduction method before recognizing the image patterns with a linear kernel function of SVM is more accurate and takes less time than the recognition that did not use dimensionality reduction. LDA is a suitable technique for physiological biometrics, whereas PCA is appropriate for the behavioral biometrics. We also found out that only 1% of transformed dimensions is adequate for the accurate recognition of biometric image patterns.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128933942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mutual Authentication between Ships in the E-Navigation Environment 电子航行环境下船舶间的相互认证
2014 7th International Conference on Security Technology Pub Date : 2014-12-20 DOI: 10.1109/SECTECH.2014.11
Seung-hee Oh, Dae-Hee Seo, Byunggil Lee, Byung-ho Chung
{"title":"Mutual Authentication between Ships in the E-Navigation Environment","authors":"Seung-hee Oh, Dae-Hee Seo, Byunggil Lee, Byung-ho Chung","doi":"10.1109/SECTECH.2014.11","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.11","url":null,"abstract":"In recent maritime communication, discussion for the maritime information exchange has been carried out continuously around the e-Navigation for environmental protection and safe navigation. However, it is the situation that is concentrated only in the service and a common data structure for maritime information sharing, security considerations is insufficient. In this paper, we analysis the security threats and vulnerabilities that can be generated in the e-Navigation environment and propose a mutual authentication method to provide reliable communication between ships of e-Navigation. In the proposed scheme, it assures the reliability with each other through mutual authentication before starting AIS communication between ships by utilizing the MMSI is a unique key of ship.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122445246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effectiveness of Port Hopping as a Moving Target Defense 港口跳跃作为移动目标防御的有效性
2014 7th International Conference on Security Technology Pub Date : 2014-12-20 DOI: 10.1109/SECTECH.2014.9
Yue Luo, Baosheng Wang, Gui-lin Cai
{"title":"Effectiveness of Port Hopping as a Moving Target Defense","authors":"Yue Luo, Baosheng Wang, Gui-lin Cai","doi":"10.1109/SECTECH.2014.9","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.9","url":null,"abstract":"Port hopping is a typical moving target defense, which constantly changes service port number to thwart reconnaissance attack. It is effective in hiding service identities and confusing potential attackers, but it is still unknown how effective port hopping is and under what circumstances it is a viable proactive defense because the existed works are limited and they usually discuss only a few parameters and give some empirical studies. This paper introduces urn model and quantifies the likelihood of attacker success in terms of the port pool size, number of probes, number of vulnerable services, and hopping frequency. Theoretical analysis shows that port hopping is an effective and promising proactive defense technology in thwarting network attacks.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125909649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Extending Advanced Evasion Techniques Using Combinatorial Search 利用组合搜索扩展高级逃避技术
2014 7th International Conference on Security Technology Pub Date : 2014-12-20 DOI: 10.1109/SECTECH.2014.18
M'hamed Chammem, Mohamed Hamdi, Tai-hoon Kim
{"title":"Extending Advanced Evasion Techniques Using Combinatorial Search","authors":"M'hamed Chammem, Mohamed Hamdi, Tai-hoon Kim","doi":"10.1109/SECTECH.2014.18","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.18","url":null,"abstract":"In this paper, we extend the concept of Advanced Evasion Techniques (AETs) by exploring new alternatives to reduce the complexity of existing evasion tools. The major objective is to enhance the security testing potential brought by AETs by increasing the number of combinations that can be tested and checked on the Device Under Test (DUT). We analyze the performance of non-exhaustive search strategies by the use of clusters where multiple evasion techniques are combined. To this end, we propose the use of probabilistic trees to design scenario-based AETs where multiple architectures are considered. For an accurate analysis of the contribution resulting from the proposed idea, we illustrate our idea using a practical evasion tool, namely the EVADER tool designed by McAfee.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123024971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Analysis of Sensitive Information System Security Models 敏感信息系统安全模型分析
2014 7th International Conference on Security Technology Pub Date : 2014-12-20 DOI: 10.1109/SECTECH.2014.13
Tianbo Lu, Xiaobo Guo, Lingling Zhao, Yang Li, Peng Lin
{"title":"An Analysis of Sensitive Information System Security Models","authors":"Tianbo Lu, Xiaobo Guo, Lingling Zhao, Yang Li, Peng Lin","doi":"10.1109/SECTECH.2014.13","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.13","url":null,"abstract":"The study of security models for sensitive information systems has been taken on for years. During this century, the thought of seeking the system security to the source of system development lifecycle received huge improvement in the system and software assurance domain. This paper expounds the understanding of information security by illustrating information security study development progress since pre-computer age and presents a description of cyberspace and cyberization security by summarizing the status quo of cyberization. Then a security model called PDRL, which includes six core security attributes of sensitive information systems, is proposed to protect the security of sensitive information systems in the whole system life-cycle.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129852984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Analysis of Cyber Physical System Security Theories 网络物理系统安全理论分析
2014 7th International Conference on Security Technology Pub Date : 2014-12-20 DOI: 10.1109/SECTECH.2014.12
Tianbo Lu, Jiaxi Lin, Lingling Zhao, Yang Li, Yong Peng
{"title":"An Analysis of Cyber Physical System Security Theories","authors":"Tianbo Lu, Jiaxi Lin, Lingling Zhao, Yang Li, Yong Peng","doi":"10.1109/SECTECH.2014.12","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.12","url":null,"abstract":"Governments, companies, universities and research institutes are pushing the research and development of cyber-physical systems (CPS). However, the development of cyber-physical systems is constrained by security factors. According to this situation, this paper describes CPS security properties and basic theories, summarizes security attacks to cyber-physical systems as a theoretical reference for the study of cyber - physical systems and to provide useful security defense.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127474531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Determining Location and Movement Pattern Using Anonymized WiFi Access Point BSSID 使用匿名WiFi接入点BSSID确定位置和移动模式
2014 7th International Conference on Security Technology Pub Date : 2014-12-20 DOI: 10.1109/SECTECH.2014.10
M. N. Sakib, Junaed Bin Halim, Chin-Tser Huang
{"title":"Determining Location and Movement Pattern Using Anonymized WiFi Access Point BSSID","authors":"M. N. Sakib, Junaed Bin Halim, Chin-Tser Huang","doi":"10.1109/SECTECH.2014.10","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.10","url":null,"abstract":"Location tracking applications are usually based on exact GPS location information and non-anonymized WiFi Access Point (AP) information. It has been assumed that anonymizing WiFi AP information is an effective way to preserve location privacy of the connected users. In this work, our goal is to show that the privacy of connected users' movement pattern can still be compromised by a determined attacker even if the WiFi AP information is anonymized. We investigated the feasibility of tracking user's movement between locations from anonymized WiFi AP BSSIDs based on large Device Analyzer datasets. Our experiments show that the user's daily movement pattern can be identified with almost 83% accuracy.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129913719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Secure and Efficient Data Integrity Based on Iris Features in Cloud Computing 云计算中基于虹膜特征的安全高效数据完整性
2014 7th International Conference on Security Technology Pub Date : 2014-12-01 DOI: 10.1109/SECTECH.2014.8
Salah H. Abbdal, Hai Jin, Deqing Zou, A. Yassin
{"title":"Secure and Efficient Data Integrity Based on Iris Features in Cloud Computing","authors":"Salah H. Abbdal, Hai Jin, Deqing Zou, A. Yassin","doi":"10.1109/SECTECH.2014.8","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.8","url":null,"abstract":"Cloud computing aids users to outsource their data in the cloud remotely to prevent them from burdens of local storage and maintenance. Users no longer have possession and control of these data. This property brings many new security challenges like unauthorised entities and correctness of stored data. In this paper, we focus on the problem of ensuring the integrity of data stored in the cloud. We propose a method which combines biometric and cryptography techniques in a cost-effective manner for data owners to gain trust in the cloud. We present efficient and secure integrity based on the XOR operation and iris feature extraction as the strong factors. This work gives the cloud user more confidence in detecting any block that has been changed. Additionally, our proposed scheme employs user's iris features to secure and integrate data in a manner difficult for any internal or external entity to take or compromise it. Extensive security and performance analysis show that our scheme is highly efficient and provably secure.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123297781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信