2022 6th International Conference on Cryptography, Security and Privacy (CSP)最新文献

筛选
英文 中文
Context-based Adblocker using Siamese Neural Network 基于上下文的广告拦截使用暹罗神经网络
2022 6th International Conference on Cryptography, Security and Privacy (CSP) Pub Date : 2022-01-01 DOI: 10.1109/CSP55486.2022.00019
Shawn Collins, Emily Wu, R. Ning
{"title":"Context-based Adblocker using Siamese Neural Network","authors":"Shawn Collins, Emily Wu, R. Ning","doi":"10.1109/CSP55486.2022.00019","DOIUrl":"https://doi.org/10.1109/CSP55486.2022.00019","url":null,"abstract":"This paper proposes a new content-based ad-blocker to minimize the amount of human effort required to effectively combat pushed advertisements. Current ad-blocker models are expensive to maintain and not always effective in identifying confusable images that may play different roles across diverse websites. We investigated the possibility of solving these problems with the introduction of a deep learning, content-based ad-blocker model. More specifically, the proposed ad-blocker identifies advertisement images by combining the contained information of a given image and the content of the website it originated from. The proposed solution was prototyped and applied to a diverse selection of popular websites, achieving a detection accuracy of 98%.","PeriodicalId":187713,"journal":{"name":"2022 6th International Conference on Cryptography, Security and Privacy (CSP)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116429321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Future Roadmap for Cyber-attack Detection 网络攻击检测的未来路线图
2022 6th International Conference on Cryptography, Security and Privacy (CSP) Pub Date : 2022-01-01 DOI: 10.1109/CSP55486.2022.00021
Raha Soleymanzadeh, R. Kashef
{"title":"The Future Roadmap for Cyber-attack Detection","authors":"Raha Soleymanzadeh, R. Kashef","doi":"10.1109/CSP55486.2022.00021","DOIUrl":"https://doi.org/10.1109/CSP55486.2022.00021","url":null,"abstract":"Cyber-attacks can cause delays in world operations and substantial economic losses. Therefore, there is a greater interest in cyber-attack detection (CAD) to accommodate the exponential increase in the number of attacks. Various CAD techniques have been developed, including Machine Learning (ML) and Deep Learning (DL). Despite the high accuracy of the deep learning-based method when learning from large amounts of data, the performance drops considerably when learning from imbalanced data. While many studies have been conducted on imbalanced data, the majority possess weaknesses that can lead to data loss or overfitting. However, Generative Adversarial Networks can help solve problems such as overfitting and class overlapping by generating new virtual data similar to the existing data. This paper provides a comprehensive overview of the current literature in CAD methods, thus shedding light on present research and drawing a future road map for cyber-attack detection in different applications.","PeriodicalId":187713,"journal":{"name":"2022 6th International Conference on Cryptography, Security and Privacy (CSP)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116748971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IoTProtect: A Machine-Learning Based IoT Intrusion Detection System IoTProtect:基于机器学习的物联网入侵检测系统
2022 6th International Conference on Cryptography, Security and Privacy (CSP) Pub Date : 2022-01-01 DOI: 10.1109/CSP55486.2022.00020
M. Alani
{"title":"IoTProtect: A Machine-Learning Based IoT Intrusion Detection System","authors":"M. Alani","doi":"10.1109/CSP55486.2022.00020","DOIUrl":"https://doi.org/10.1109/CSP55486.2022.00020","url":null,"abstract":"The rapid growth in IoT adoption in various daily-life applications, combined with the lack of proper patching and securing, has made IoT an easy target for malicious actors. As we notice the increase in the utilization of IoT devices in conducting security attacks around the world, research needs to catch up and protect IoT devices.In this paper, we present IoTProtect; a machine-learning based intrusion detection system utilizing the TON_IoT dataset in training and testing. Testing the proposed system showed 99.999% detection accuracy with 0.001% false-positive, and 0% false-negative with excellent timing performance.","PeriodicalId":187713,"journal":{"name":"2022 6th International Conference on Cryptography, Security and Privacy (CSP)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131806961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CoAP-DoS: An IoT Network Intrusion Data Set CoAP-DoS:物联网网络入侵数据集
2022 6th International Conference on Cryptography, Security and Privacy (CSP) Pub Date : 2022-01-01 DOI: 10.1109/CSP55486.2022.00025
Jared Mathews, Prosenjit Chatterjee, S. Banik
{"title":"CoAP-DoS: An IoT Network Intrusion Data Set","authors":"Jared Mathews, Prosenjit Chatterjee, S. Banik","doi":"10.1109/CSP55486.2022.00025","DOIUrl":"https://doi.org/10.1109/CSP55486.2022.00025","url":null,"abstract":"The need for secure Internet of Things (IoT) devices is growing as IoT devices are becoming more integrated into vital networks. Many systems rely on these devices to remain available and provide reliable service. Denial of service attacks against IoT devices are a real threat due to the fact these low power devices are very susceptible to denial-of-service attacks. Machine learning enabled network intrusion detection systems are effective at identifying new threats, but they require a large amount of data to work well. There are many network traffic data sets but very few that focus on IoT network traffic. Within the IoT network data sets there is a lack of CoAP denial of service data. We propose a novel data set covering this gap. We develop a new data set by collecting network traffic from real CoAP denial of service attacks and compare the data on multiple different machine learning classifiers. We show that the data set is effective on many classifiers.","PeriodicalId":187713,"journal":{"name":"2022 6th International Conference on Cryptography, Security and Privacy (CSP)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121777360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cyber Threat Analysis and Trustworthy Artificial Intelligence 网络威胁分析与可信赖人工智能
2022 6th International Conference on Cryptography, Security and Privacy (CSP) Pub Date : 2022-01-01 DOI: 10.1109/CSP55486.2022.00024
S. Wang, Md Tanvir Arafin, O. Osuagwu, K. Wandji
{"title":"Cyber Threat Analysis and Trustworthy Artificial Intelligence","authors":"S. Wang, Md Tanvir Arafin, O. Osuagwu, K. Wandji","doi":"10.1109/CSP55486.2022.00024","DOIUrl":"https://doi.org/10.1109/CSP55486.2022.00024","url":null,"abstract":"Cyber threats can cause severe damage to computing infrastructure and systems as well as data breaches that make sensitive data vulnerable to attackers and adversaries. It is therefore imperative to discover those threats and stop them before bad actors penetrating into the information systems.Threats hunting algorithms based on machine learning have shown great advantage over classical methods. Reinforcement learning models are getting more accurate for identifying not only signature-based but also behavior-based threats. Quantum mechanics brings a new dimension in improving classification speed with exponential advantage. The accuracy of the AI/ML algorithms could be affected by many factors, from algorithm, data, to prejudicial, or even intentional. As a result, AI/ML applications need to be non-biased and trustworthy.In this research, we developed a machine learning-based cyber threat detection and assessment tool. It uses two-stage (both unsupervised and supervised learning) analyzing method on 822,226 log data recorded from a web server on AWS cloud. The results show the algorithm has the ability to identify the threats with high confidence.","PeriodicalId":187713,"journal":{"name":"2022 6th International Conference on Cryptography, Security and Privacy (CSP)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128106724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Spectrum-based Fingerprint Extraction and Identification Method of 100M Ethernet Card 基于频谱的100M以太网卡指纹提取与识别方法
2022 6th International Conference on Cryptography, Security and Privacy (CSP) Pub Date : 2022-01-01 DOI: 10.1109/CSP55486.2022.00027
Jiaqi Liu, A. Hu, Sheng Li
{"title":"Spectrum-based Fingerprint Extraction and Identification Method of 100M Ethernet Card","authors":"Jiaqi Liu, A. Hu, Sheng Li","doi":"10.1109/CSP55486.2022.00027","DOIUrl":"https://doi.org/10.1109/CSP55486.2022.00027","url":null,"abstract":"In the local area network (LAN) system, most terminals are connected to edge switches through fast or gigabit Ethernet connections. The terminal access security problem has always been a key concern. This paper proposes a method of Ethernet card fingerprint extraction and identification based on spectrum characteristics, which solves the problem of illegal terminal access with counterfeit media access control (MAC) addresses. The extracted Ethernet card fingerprint is used as the identity of the terminal, which is unique and difficult to be counterfeited. The frequency-domain features of the signals can be extracted by analyzing the Ethernet card signals of wired terminals received by the switch. The dimension of these features is reduced to obtain their Ethernet card fingerprints, which can be effectively classified and identified. In the classification and recognition experiments on 7 Ethernet cards of 100M produced by the same manufacturer, 26 Ethernet cards by different manufacturers, and 65 Ethernet cards by mixed manufacturers, all Ethernet cards can achieve an accuracy of 100%. This method can be widely used for identity authentication during the access and connection of terminals and provides a secure access control scheme.","PeriodicalId":187713,"journal":{"name":"2022 6th International Conference on Cryptography, Security and Privacy (CSP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129401880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Blockchain-based identity dicovery between heterogenous identity management systems 异构身份管理系统之间基于区块链的身份发现
2022 6th International Conference on Cryptography, Security and Privacy (CSP) Pub Date : 2022-01-01 DOI: 10.1109/CSP55486.2022.00032
M. Dabrowski, P. Pacyna
{"title":"Blockchain-based identity dicovery between heterogenous identity management systems","authors":"M. Dabrowski, P. Pacyna","doi":"10.1109/CSP55486.2022.00032","DOIUrl":"https://doi.org/10.1109/CSP55486.2022.00032","url":null,"abstract":"Identity Management Systems (IdMS) have seemingly evolved in recent years, both in terms of modelling approach and in terms of used technology. The early centralized, later federated and user-centric Identity Management (IdM) was finally replaced by Self-Sovereign Identity (SSI). Solutions based on Distributed Ledger Technology (DLT) appeared, with prominent examples of uPort, Sovrin or ShoCard. In effect, users got more freedom in creation and management of their identities. IdM systems became more distributed, too. However, in the area of interoperability, dynamic and ad-hoc identity management there has been almost no significant progress. Quest for the best IdM system which will be used by all entities and organizations is deemed to fail. The environment of IdM systems is, and in the near future will still be, heterogenous. Therefore a person will have to manage her or his identities in multiple IdM systems. In this article authors argument that future-proof IdM systems should be able to interoperate with each other dynamically, i.e. be able to discover existence of different identities of a person across multiple IdM systems, dynamically build trust relations and be able to translate identity assertions and claims across various IdM domains. Finally, authors introduce identity relationship model and corresponding identity discovery algorithm, propose IdMS-agnostic identity discovery service design and its implementation with use of Ethereum and Smart Contracts.","PeriodicalId":187713,"journal":{"name":"2022 6th International Conference on Cryptography, Security and Privacy (CSP)","volume":"28 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120853183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The AILA Methodology for Automated and Intelligent Likelihood Assignment 自动智能似然分配的AILA方法
2022 6th International Conference on Cryptography, Security and Privacy (CSP) Pub Date : 2022-01-01 DOI: 10.1109/CSP55486.2022.00030
G. Bella, Cristian Daniele, Mario Raciti
{"title":"The AILA Methodology for Automated and Intelligent Likelihood Assignment","authors":"G. Bella, Cristian Daniele, Mario Raciti","doi":"10.1109/CSP55486.2022.00030","DOIUrl":"https://doi.org/10.1109/CSP55486.2022.00030","url":null,"abstract":"Risk assessment is core to any institution's evaluation of risk, notably for what concerns people's privacy. The assessment often relies on information stated in a policy shaped as a text document. The risk assessor, or analyst in brief, is called to understand documentation that can be long, unclear or incomplete, hence subjectivity or distraction may strongly influence the process, particularly for identifying each relevant asset and for the assignment of the likelihood value of a given threat to an identified asset. The aim of this paper is to reduce the influence of subjectivity and distraction through risk assessment by means of our methodology for the Automated and Intelligent Likelihood Assignment (AILA). While the analyst's role cannot be emptied, it is facilitated through entities identification and likelihood assignment to threats for assets. The methodology adopts Natural Language Processing for summarisation and entity recognition, it tailors fully-supervised Machine Learning over policy documents and it leverages an existing tool supporting risk assessment, PILAR, in order to gain a more objective likelihood assignment. The paper demonstrates AILA over three real-world case studies from the automotive domain, culminating with the risk assessment exercises over the privacy policies of Toyota, Mercedes and Tesla. The executable components of AILA, the AILA Entity Extractor and the AILA Classifier are released as open source.","PeriodicalId":187713,"journal":{"name":"2022 6th International Conference on Cryptography, Security and Privacy (CSP)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132992441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher 针对当前轻量级分组密码的电磁侧信道攻击弹性
2022 6th International Conference on Cryptography, Security and Privacy (CSP) Pub Date : 2021-12-22 DOI: 10.1109/CSP55486.2022.00018
N. Gunathilake, A. Al-Dubai, W. Buchanan, O. Lo
{"title":"Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher","authors":"N. Gunathilake, A. Al-Dubai, W. Buchanan, O. Lo","doi":"10.1109/CSP55486.2022.00018","DOIUrl":"https://doi.org/10.1109/CSP55486.2022.00018","url":null,"abstract":"Lightweight cryptography is a novel diversion from conventional cryptography that targets internet-of-things (IoT) platform due to resource constraints. In comparison, it offers smaller cryptographic primitives such as shorter key sizes, block sizes and lesser energy drainage. The main focus can be seen in algorithm developments in this emerging subject. Thus, verification is carried out based upon theoretical (mathematical) proofs mostly. Among the few available side-channel analysis studies found in literature, the highest percentage is taken by power attacks. PRESENT is a promising lightweight block cipher to be included in IoT devices in the near future. Thus, the emphasis of this paper is on lightweight cryptology, and our investigation shows unavailability of a correlation electromagnetic analysis (CEMA) of it. Hence, in an effort to fill in this research gap, we opted to investigate the capabilities of CEMA against the PRESENT algorithm. This work aims to determine the probability of secret key leakage with a minimum number of electromagnetic (EM) waveforms possible. The process initially started from a simple EM analysis (SEMA) and gradually enhanced up to a CEMA. This paper presents our methodology in attack modelling, current results that indicate a probability of leaking seven bytes of the key and upcoming plans for optimisation. In addition, introductions to lightweight cryptanalysis and theories of EMA are also included.","PeriodicalId":187713,"journal":{"name":"2022 6th International Conference on Cryptography, Security and Privacy (CSP)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133858453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信