2010 2nd International Workshop on Security and Communication Networks (IWSCN)最新文献

筛选
英文 中文
Unlinking database entries: Implementation issues in privacy preserving secure logging 解除数据库条目的链接:保护隐私的安全日志记录的实现问题
2010 2nd International Workshop on Security and Communication Networks (IWSCN) Pub Date : 2010-05-26 DOI: 10.1109/IWSCN.2010.5497998
Hans Hedbom, T. Pulls
{"title":"Unlinking database entries: Implementation issues in privacy preserving secure logging","authors":"Hans Hedbom, T. Pulls","doi":"10.1109/IWSCN.2010.5497998","DOIUrl":"https://doi.org/10.1109/IWSCN.2010.5497998","url":null,"abstract":"This paper discusses implementation issues related to using relational databases as storage when implementing privacy preserving secure logs. In these types of logs it is important to keep the unlinkability properties of log entries intact when the entries are stored. We briefly describe the concept of privacy preserving secure logging and give the rational for it. The problems of using relational database systems as storage is discussed and we suggest three solutions to the problem. Two of the solutions are analyzed and compared and we show that at least one of the solutions is feasible in a real live setting and that the added overhead of the solution is very small.","PeriodicalId":217163,"journal":{"name":"2010 2nd International Workshop on Security and Communication Networks (IWSCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131365929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Constraints on autonomous use of standard GPU components for asynchronous observations and intrusion detection 异步观察和入侵检测中自主使用标准GPU组件的约束
2010 2nd International Workshop on Security and Communication Networks (IWSCN) Pub Date : 2010-05-26 DOI: 10.1109/IWSCN.2010.5497999
Reinhard Riedmuller, Mark M. Seeger, Harald Baier, C. Busch, S. Wolthusen
{"title":"Constraints on autonomous use of standard GPU components for asynchronous observations and intrusion detection","authors":"Reinhard Riedmuller, Mark M. Seeger, Harald Baier, C. Busch, S. Wolthusen","doi":"10.1109/IWSCN.2010.5497999","DOIUrl":"https://doi.org/10.1109/IWSCN.2010.5497999","url":null,"abstract":"The high computational power of graphics processing units (GPU) is used for several purposes nowadays. Factoring integers, computing discrete logarithms, and pattern matching in network intrusion detection systems (IDS) are popular tasks in the field of information security where GPUs are used for acceleration. GPUs are commodity components and are widely available in computer systems which would make them an ideal platform for a wide-spread IDS. We investigate the feasibility to use current GPUs for asynchronous host intrusion detection as proposed in a former work and come to the conclusion that several constraints of GPUs limit the use for concurrent and asynchronous off-CPU processing in host IDSs. GPUs have restrictions in terms of continuity, asynchronism, and unrestricted access to perform this task. We propose an observation mechanism and discuss current constraints on autonomous use of standard GPU components for intrusion detection. Finally, we come to the conclusion that several modifications to graphics cards are necessary to enable our approach.","PeriodicalId":217163,"journal":{"name":"2010 2nd International Workshop on Security and Communication Networks (IWSCN)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122693246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A delegation-based HIP signaling scheme for the Ultra Flat Architecture 一种基于委托的超平面架构的HIP信令方案
2010 2nd International Workshop on Security and Communication Networks (IWSCN) Pub Date : 2010-05-26 DOI: 10.1109/IWSCN.2010.5498001
L. Bokor, Z. Faigl, S. Imre
{"title":"A delegation-based HIP signaling scheme for the Ultra Flat Architecture","authors":"L. Bokor, Z. Faigl, S. Imre","doi":"10.1109/IWSCN.2010.5498001","DOIUrl":"https://doi.org/10.1109/IWSCN.2010.5498001","url":null,"abstract":"The Ultra Flat Architecture is a new concept of fixed-mobile convergent networks that aims to scale well with the mobile Internet traffic explosion prognosticated for the next 5–10 years. This paper presents a new delegation-based UFA signaling framework using HIP, IEEE 802.21 and the context transfer protocol. The main procedures contributed by this signaling framework are terminal attachment, session establishment, proactive handover preparation and handover execution services. The paper introduces several novel Host Identity Protocol extensions, i.e., two different HIP delegation service types for optimized message exchange in HIP-based UFA mobility and multihoming operations, a context transfer scheme for HIP and IPsec associations supporting and extending the mechanisms of the delegation-based UFA functions, and a fast operator-centric method for HIP-level access authorization. The proposed UFA signaling framework is compared with the existing SIP-based UFA signaling solution. The comparison shows that our scheme is able to support legacy Internet applications in an operator based environment, it is stronger in security, but its deployment requires more additional modules in the architecture. For IMS applications, the SIP-based alternative is a better choice.","PeriodicalId":217163,"journal":{"name":"2010 2nd International Workshop on Security and Communication Networks (IWSCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133464194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Eigensteps: A giant leap for gait recognition 特征步:步态识别的巨大飞跃
2010 2nd International Workshop on Security and Communication Networks (IWSCN) Pub Date : 2010-05-26 DOI: 10.1109/IWSCN.2010.5497991
Patrick A. H. Bours, R. Shrestha
{"title":"Eigensteps: A giant leap for gait recognition","authors":"Patrick A. H. Bours, R. Shrestha","doi":"10.1109/IWSCN.2010.5497991","DOIUrl":"https://doi.org/10.1109/IWSCN.2010.5497991","url":null,"abstract":"In this paper we will show that using Principle Component Analysis (PCA) on accelerometer based gait data will give a large improvement on the performance. On a dataset of 720 gait samples (60 volunteers and 12 gait samples per volunteer) we achieved an EER of 1.6% while the best result so far, using the Average Cycle Method (ACM), gave a result of nearly 6%. This tremendous increase makes gait recognition a viable method in commercial applications in the near future.","PeriodicalId":217163,"journal":{"name":"2010 2nd International Workshop on Security and Communication Networks (IWSCN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116003884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Definition of entity authentication 实体认证的定义
2010 2nd International Workshop on Security and Communication Networks (IWSCN) Pub Date : 2010-05-26 DOI: 10.1109/IWSCN.2010.5498000
Naveed Ahmed, C. Jensen
{"title":"Definition of entity authentication","authors":"Naveed Ahmed, C. Jensen","doi":"10.1109/IWSCN.2010.5498000","DOIUrl":"https://doi.org/10.1109/IWSCN.2010.5498000","url":null,"abstract":"Authentication is considered a pre-requisite for communication security, but the definition of authentication is generally not agreed upon. Many attacks on authentication protocols are the result of misunderstanding of the goals of authentication. This state of affairs indicate limitations in theoretical understanding of the meanings of authentication. We provide a new insight in this direction and formalize it in CFPS (Common Framework for authentication Protocols' Specifications). CFPS provides a precise scope of definition for authentication protocols, which could make the design and analysis process more systematic.","PeriodicalId":217163,"journal":{"name":"2010 2nd International Workshop on Security and Communication Networks (IWSCN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132364076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Fragment retention characteristics in slack space — Analysis and measurements 松弛空间中的碎片保留特性。分析和测量
2010 2nd International Workshop on Security and Communication Networks (IWSCN) Pub Date : 2010-05-26 DOI: 10.1109/IWSCN.2010.5497996
T. Holleboom, Johan Garcia
{"title":"Fragment retention characteristics in slack space — Analysis and measurements","authors":"T. Holleboom, Johan Garcia","doi":"10.1109/IWSCN.2010.5497996","DOIUrl":"https://doi.org/10.1109/IWSCN.2010.5497996","url":null,"abstract":"When files are deleted, their information is not removed from the storage media. This is a well known fact, and there exist numerous undelete utilities to recover newly deleted files. When deleted files have been partly overwritten, the data from the part of the file that remains in unallocated space can be readily extracted by file carving. Such carving is often performed in forensic investigations. Furthermore, as a consequence of file system implementation specifics, there additionally exist small remains of the previous files in the space at the end of new files. In this paper we focus on these small remains of previous files, or micro-fragments, that exist even after all the space allocated to the previous file has been reallocated to new files. We derive expressions for modeling the number of micro-fragments that can be expected to be found, and perform experiments to evaluate the analytical model. The obtained results indicate good correspondence between the analytical predictions and the measured results.","PeriodicalId":217163,"journal":{"name":"2010 2nd International Workshop on Security and Communication Networks (IWSCN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114391489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A framework for detecting anomalies in HTTP traffic using instance-based learning and k-nearest neighbor classification 一个使用基于实例的学习和k近邻分类来检测HTTP流量异常的框架
2010 2nd International Workshop on Security and Communication Networks (IWSCN) Pub Date : 2010-05-26 DOI: 10.1109/IWSCN.2010.5497997
Michael Kirchner
{"title":"A framework for detecting anomalies in HTTP traffic using instance-based learning and k-nearest neighbor classification","authors":"Michael Kirchner","doi":"10.1109/IWSCN.2010.5497997","DOIUrl":"https://doi.org/10.1109/IWSCN.2010.5497997","url":null,"abstract":"Attacks against web applications and web-based services that use HTTP as a communication protocol pose a serious threat to today's information technology infrastructures. A common countermeasure is to apply misuse detection and prevention systems that compare the contents of HTTP traffic against signatures of known attacks, as it is for example done by web application firewalls. A serious drawback of these systems is the fact that the used signatures often are not tailored for the individual web applications to be protected. Furthermore, signatures can often be circumvented by rewriting attacks into different forms, resulting in successful exploitation and circumvention of a misuse detection or prevention system. This paper presents the design and implementation of an anomaly detection framework for HTTP traffic that operates without signatures of known attacks. It rather learns normal usage patterns of web-based applications by inspecting full HTTP request and response contents. The results are then used for anomaly detection. The framework automatically adjusts to the applications to be monitored, derives normal usage patterns and compares subsequent HTTP traffic to the built knowledge base.","PeriodicalId":217163,"journal":{"name":"2010 2nd International Workshop on Security and Communication Networks (IWSCN)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125010042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Evaluation of delay performance of traffic shapers 交通整形器的延迟性能评价
2010 2nd International Workshop on Security and Communication Networks (IWSCN) Pub Date : 2010-05-26 DOI: 10.1109/IWSCN.2010.5497994
Junaid M. Shaikh, T. N. Minhas, P. Arlos, M. Fiedler
{"title":"Evaluation of delay performance of traffic shapers","authors":"Junaid M. Shaikh, T. N. Minhas, P. Arlos, M. Fiedler","doi":"10.1109/IWSCN.2010.5497994","DOIUrl":"https://doi.org/10.1109/IWSCN.2010.5497994","url":null,"abstract":"In network emulation, traffic shapers are used to shape the performance of the network. They are provided with certain inputs in a test environment to vary the network performance accordingly in order to investigate the effects of different network conditions on applications in real yet emulated scenarios. However, it is very important for the shapers to work as supposed in order to successfully realize the desired network conditions. They may make the results of network emulations unrealistic and unreliable if their functioning is not according to the desired specification. In this work, we evaluate the delay shaping of three traffic shapers, NIST Net, Netem and KauNet through the results obtained from a number of experiments. A comparison of the output of their delay shaping is presented. This comparison can enable us to select the most suitable shaper based on the required shaping. Effects of hardware platforms on the shaping are also filtered out by performing the experiments with shapers installed on Advance Micro Devices (AMD) and Intel platforms separately. Different Protocol Data Unit (PDU) sizes are used in the experiments to test the influence of packet sizes on the shaping. These delay evaluation results are then complemented by the Coefficient of Throughput Variation (CoTV) results.","PeriodicalId":217163,"journal":{"name":"2010 2nd International Workshop on Security and Communication Networks (IWSCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121068339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Biometric template data protection in mobile device environment using XML-database 基于xml数据库的移动设备环境下的生物识别模板数据保护
2010 2nd International Workshop on Security and Communication Networks (IWSCN) Pub Date : 2010-05-26 DOI: 10.1109/IWSCN.2010.5497993
Rubathas Thirumathyam, M. Derawi
{"title":"Biometric template data protection in mobile device environment using XML-database","authors":"Rubathas Thirumathyam, M. Derawi","doi":"10.1109/IWSCN.2010.5497993","DOIUrl":"https://doi.org/10.1109/IWSCN.2010.5497993","url":null,"abstract":"This paper proposes a non-traditional XML database which supports biometric templates and provides an API which can be used by independent applications in mobile device environments. Until recently biometric systems are becoming more and more visible in mobile phone devices including fingerprint recognition or gait recognition. To gain a real understanding of how it is possible to protect the biometric data, this paper first starts out with introducing a technique for security in a biometric system and emphasizes that template protection is important by going through the vulnerabilities and threats. Furthermore, it points out requirements for template protection, a recital of various template protection schemes and a brief overview of biometric standards.","PeriodicalId":217163,"journal":{"name":"2010 2nd International Workshop on Security and Communication Networks (IWSCN)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117237296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Proposal of a VPN configuration delivery system VPN配置下发系统的建议
2010 2nd International Workshop on Security and Communication Networks (IWSCN) Pub Date : 2010-05-26 DOI: 10.1109/IWSCN.2010.5497992
Yoshinao Kikuchi, Takaaki Koyama, Kazuhiro Kishi, Sotetsu Iwamura
{"title":"Proposal of a VPN configuration delivery system","authors":"Yoshinao Kikuchi, Takaaki Koyama, Kazuhiro Kishi, Sotetsu Iwamura","doi":"10.1109/IWSCN.2010.5497992","DOIUrl":"https://doi.org/10.1109/IWSCN.2010.5497992","url":null,"abstract":"This paper proposes a VPN configuration delivery system capable of reducing the configuration burden on users when making remote-access VPN connections and capable of supporting immediate VPN connections to VPN servers created on an ad hoc basis. The proposed system is able to lessen configuration inconvenience and create immediate VPN connections by means of a VPN configuration delivery server that links to the VPN server, generates the necessary VPN connection configuration data, and delivers the configuration data to the client. This paper also reports on the results of verifying the system's operation with an information-card prototype.","PeriodicalId":217163,"journal":{"name":"2010 2nd International Workshop on Security and Communication Networks (IWSCN)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130653092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信