Abdoulaye Tapsoba, F. Ouédraogo, Arnold Elvis Ouédraogo
{"title":"Relevance of the Gaussian classification on the Detection of DDoS Attacks","authors":"Abdoulaye Tapsoba, F. Ouédraogo, Arnold Elvis Ouédraogo","doi":"10.1109/CyberC55534.2022.00018","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00018","url":null,"abstract":"Distributed denial of service (DDoS) attacks have undergone a worrying evolution in recent years. The simplicity of the concept of these attacks, their effectiveness, and the multitude of sources of motivation make this type of attack one of the most used in the world. These attacks generate significant financial losses through service interruption or indirectly, through the damage to the target’s image. Because of this shift, many organizations are ill-equipped to handle this current type of attack. Although common out-of-the-box technologies can detect a breach, they are unable to mitigate this new level of risk. In order to keep pace with DDoS hackers, a more humane and proactive approach is also needed. The aim of this study is to show the efficiency conditions of the Gaussian distribution and to propose an approach that shows the relevance of the Gaussian model in a binary classification. The results show that the best performances are obtained when the rate of the small class is between 0.02% and 0.05% compared to the whole data.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114265708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Re-configurable Interaction Model in Distributed IoT Environment","authors":"Fangze Qiu, Huaxiao Huang, Yuji Dong","doi":"10.1109/CyberC55534.2022.00023","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00023","url":null,"abstract":"Internet of Things (IoT) is a trending paradigm that more and more devices are connected nowadays. However, although the massive IoT devices have been the infrastructure everywhere, the utilization of these devices is still challenging, especially when interacting with multiple devices in a dynamic distributed IoT environment. In this paper, a novel interaction model named UnIEM is proposed to allow Distributed User Interfaces to be dynamically configured on several IoT devices based on user preferences. The proposed model is implemented on the operating system named HarmonyOS to utilize the native distributed processing support. A video migration demo application is developed to validate the proposed model. The eventual work can assist the developers to develop IoT applications with various different devices and interaction strategies with dynamic re-configurations in run-time.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134257636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huan Lin, Zhehan Wang, Tong Xu, S. Zhou, Yang Hong, Jun Steed Huang
{"title":"Analysis of Zero-Key Authentication and Zero-Knowledge Proof","authors":"Huan Lin, Zhehan Wang, Tong Xu, S. Zhou, Yang Hong, Jun Steed Huang","doi":"10.1109/CyberC55534.2022.00012","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00012","url":null,"abstract":"Recently passwordless authentication such as zero-key authentication or zero-knowledge access control is becoming popular among businesses prioritizing their users' and employees' security and digital experience. A challenge-response mechanism and public key infrastructure (PKI) cryptography are employed to perform the zero-key authentication or zero- knowledge access control that authorizes user access to an online service without a password or any shared secret required. Using a large quantum computer, a quantum algorithm could break the hard mathematical problems underlying PKI. The National Institute of Standards and Technology (NIST) has launched a program and competition to standardize one or more post-quantum cryptographic (PQC) algorithms to fight against quantum attacks. In this paper, we have conducted the first-ever mathematical analysis of lattice-based and polynomial-based PQC by introducing the relationship between automorphism and homomorphism. This analysis can help enterprises and organizations leverage NIST-selected PQC algorithms to safeguard their online services from quantum attacks. We performed the simulation to illustrate brute force broken probability for polynomial-based or multivariate-based PQC to validate our mathematical analysis of PQC.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134403780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Soha Alrajjou, Edward Kwadwo Boahen, Chunyun Meng, Keyang Cheng
{"title":"An enhanced interpretable deep learning approach for diabetic retinopathy detection","authors":"Soha Alrajjou, Edward Kwadwo Boahen, Chunyun Meng, Keyang Cheng","doi":"10.1109/CyberC55534.2022.00029","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00029","url":null,"abstract":"Diabetic Retinopathy (DR) is a consequence of type1 or type-2 diabetes. It is critical to identify complications early since they may result in visual issues such as retinal detachment, vitreous hemorrhage, and glaucoma. The interpretability of automated classifiers for medical diagnoses such as diabetic retinopathy is critical. The primary issue is the difficulties inherent in inferring reasonable conclusions from them. In recent years, numerous efforts have been made to transform deep learning classifiers from statistical black box machines with high confidence to self-explanatory models. The concern of effective data preprocessing before classification remains unsolved. Although the application of machine Learning schemes has proven to be effective when trained in a supervised way, it still has limitations with data redundancy, feature selection, and human expert interference. Hence, a combinatorial deep learning approach is proposed to interpret diabetic retinopathy (DR) detection. The proposed method combines the Shapley Additive Explainability (SHAP) and Local 127:1679 Model-Agnostic Explanations (LIME) to analyze the deep learning output effectively. Results from our experiment show that our proposed approach outperformed the existing schemes in detecting DR.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117263344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huang Huang, Yi Yang, Liang Tang, Zhang Zhang, Nailong Liu, Mou Li, Liang Wang
{"title":"A Multimodal Off-Road Terrain Classification Benchmark for Extraterrestrial Traversability Analysis","authors":"Huang Huang, Yi Yang, Liang Tang, Zhang Zhang, Nailong Liu, Mou Li, Liang Wang","doi":"10.1109/CyberC55534.2022.00028","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00028","url":null,"abstract":"A rover in extraterrestrial exploration works in challenging environment featured by primitive landforms and hidden dangerous areas. Due to the far distance from the rover to Earth, it is one of the most crucial capabilities that the rover can recognize and model the terrain properties efficiently and autonomously. In this paper, we present a Multimodal Off-road Terrain Classification (MOTC) dataset which is collected by a four-wheeled rover equipped with ego-centric visual cameras and inertial measurement unit (IMU). The dataset is generated from a boulder-strewn mock-up of the real Mars at the Intelligent Autonomous System Laboratory in Beijing Institute of Control Engineering. 24,982 images and corresponding sensor sequences are collected and annotated into 3 kinds of surface materials and 3 kinds of scene geometries. Based on the MOTC dataset, a baseline model with a multimodal fusion architecture is proposed for terrain classification. The experiment shows that the features extracted from visual images and from IMU complement each other to achieve improvements of terrain classification accuracy of the challenging extraterrestrial surface.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130438646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nan Yang, Cen Chen, Tao Yuan, Yujie Wang, Xiao Gu, Dan Yang
{"title":"Security hardening solution for docker container","authors":"Nan Yang, Cen Chen, Tao Yuan, Yujie Wang, Xiao Gu, Dan Yang","doi":"10.1109/cyberc55534.2022.00049","DOIUrl":"https://doi.org/10.1109/cyberc55534.2022.00049","url":null,"abstract":"Docker uses software isolation mechanism while sharing the operating system kernel with the host, which results in insufficient isolation between containers and hosts. Attackers can affect the stable operation of hosts and other containers by attacking containers, causing container escape issues. In this paper, we design a security hardening scheme for docker containers. By detecting the vulnerabilities in container images, it avoids malicious vulnerabilities and performs image measurement to ensure that the images before the container is started has not been tampered. Through the container integrity measurement module, the process of measuring the code segment, data segment, and the shared library of the container ensures that the contents of these areas will not be tampered during the container’s operation. Further, it reduces the attacking surface by setting the system whitelist for the container process and restricting the interaction between the container and the external network. This improves the container safety and reliability.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124686674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-based Multi-layer Data Security Sharing Model","authors":"Yishan Wei, Xiaomei Cao","doi":"10.1109/CyberC55534.2022.00020","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00020","url":null,"abstract":"Facing the era of big data, the traditional data sharing model has many problems such as low execution efficiency, opaque data sharing process, and inflexible processing, which can no longer meet the demand for secure data sharing. So we present a blockchain-based multi-layer data security sharing model (ML-DSM). The model not only combines blockchain and attribute-based access control technology, but also introduces malicious access behavior judgment and user rating mechanism. Judging malicious access behavior helps detect malicious users in time at the early stage of access control, and effectively prevents malicious attacks such as DoS. In the user rating mechanism, the smart contract evaluates the user's reputation level based on the user's current and historical reputation scores and judges whether the reputation level is higher than the level of the requested data. The rating mechanism not only dynamically adjusts the access rights of the requestor but also effectively reduces the average judgment time of access control. The final experimental analysis results show that the data sharing model in this paper can improve the execution efficiency of access control while ensuring the security of the shared data. Thus ML-DSM achieves more secure and efficient data sharing.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115117106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}