2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)最新文献

筛选
英文 中文
Secure access & authentication for collaborative intercloud exchange service 协作式云间交换服务的安全访问和认证
F. Guenane, A. Serhrouchni
{"title":"Secure access & authentication for collaborative intercloud exchange service","authors":"F. Guenane, A. Serhrouchni","doi":"10.1109/SSIC.2015.7245331","DOIUrl":"https://doi.org/10.1109/SSIC.2015.7245331","url":null,"abstract":"Recent advances in information technology make remote collaboration and resource sharing easier for next generation of distributed systems. The Intercloud is an interconnection system of several cloud provider infrastructures that allows the dynamic coordination of the deployment of applications and the distribution of the load across multiple data centers. In this paper, we propose a new design to establish a new generation of secure collaborative cloud services where several companies are patially or fully pooling their resources to optimize their operating costs and increase the availability of their services in a secure way by performing secure access & authentication for collaborative interCloud exchange services.","PeriodicalId":242945,"journal":{"name":"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121621491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bayesian-based model for a reputation system in vehicular networks 基于贝叶斯的车辆网络信誉系统模型
Y. Begriche, R. Khatoun, L. Khoukhi, Xiuzhen Chen
{"title":"Bayesian-based model for a reputation system in vehicular networks","authors":"Y. Begriche, R. Khatoun, L. Khoukhi, Xiuzhen Chen","doi":"10.1109/SSIC.2015.7245332","DOIUrl":"https://doi.org/10.1109/SSIC.2015.7245332","url":null,"abstract":"Vehicular ad hoc networks (VANETs) are a cost-effective technology to enhance driving safety and traffic efficiency. In such promising networks, security is of prime concern because an attack by a malicious vehicle might have disastrous impact leading to loss of life. Reputation trust management has been proposed in the recent years as a novel way to tackle some of those not yet solved threats in VANETs. In this paper, we propose a robust distributed reputation model based on Bayesian filter. The model allows nodes to establish profiles (e.g., malicious, honest) on their neighbors and to detect malicious behaviors (e.g., black hole, gray hole). The simulation results proved that intentionally dropping packets in VANETs can be fully detected, with our proposed Bayesian filter, with high level of accuracy.","PeriodicalId":242945,"journal":{"name":"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131342697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Overview of cyber-security of industrial control system 工业控制系统网络安全概述
Xiaohe Fan, Kefeng Fan, Yong Wang, Ruikang Zhou
{"title":"Overview of cyber-security of industrial control system","authors":"Xiaohe Fan, Kefeng Fan, Yong Wang, Ruikang Zhou","doi":"10.1109/SSIC.2015.7245324","DOIUrl":"https://doi.org/10.1109/SSIC.2015.7245324","url":null,"abstract":"With the development of information technology, the network connection of industrial control system (ICS) and information technology (IT) is becoming more and more closely. What's more, the security issues of traditional IT systems in industrial control system are also more prominent. Early industrial control system mainly uses physical isolation approach to protect security. In this paper, we review the characteristics and reference models of industrial control system and analyze the current security status of industrial control system. Moreover, we propose a defense-in-depth system, security policies of active protection and passive monitoring for these security issues. Besides, we also discuss the key technologies and summarize the full text.","PeriodicalId":242945,"journal":{"name":"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125402357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Safe box cloud authentication using TLS extesion 使用TLS扩展的保险箱云身份验证
M. Msahli, M. T. Hammi, A. Serhrouchni
{"title":"Safe box cloud authentication using TLS extesion","authors":"M. Msahli, M. T. Hammi, A. Serhrouchni","doi":"10.1109/SSIC.2015.7245679","DOIUrl":"https://doi.org/10.1109/SSIC.2015.7245679","url":null,"abstract":"Although the great success and the popularity of Cloud computing, an important number of challenges and threats are inherent to this new computing paradigm. One of the serious challenges in Cloud service architecture is managing authentication. Our goal in this paper is to present a flexible authentication solution based on TLS standard and asynchronous one time password mechanism. Our purpose is to be as close as possible to the TLS standard treatment and calculation of different security settings. The addition of a strong password (HOTP) preserves a maximum of operational reliability to TLS protocol. We also offer the same strength client authentication method as digital certificate. In this paper we will also demonstrate the efficiency of the proposed framework as an authentication alternative in case of private Safe Box Cloud Service.","PeriodicalId":242945,"journal":{"name":"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122415213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data protection: Combining fragmentation, encryption, and dispersion 数据保护:将碎片、加密和分散结合起来
G. Memmi, K. Kapusta, Han Qiu
{"title":"Data protection: Combining fragmentation, encryption, and dispersion","authors":"G. Memmi, K. Kapusta, Han Qiu","doi":"10.1109/SSIC.2015.7245680","DOIUrl":"https://doi.org/10.1109/SSIC.2015.7245680","url":null,"abstract":"In this paper, we first present a general description of what is a fragmentation system including a number of high level requirements. Then, we focus on fragmentation of two kinds of data. First, a bitmap image is split in two parts a public one and a private one. We describe two processes and address the question of performance. Then, we survey works on fragmentation of text: in a brute force manner then considering data stored in a structured database.","PeriodicalId":242945,"journal":{"name":"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127626244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A new genetic-based rumor diffusion model for social networks 基于遗传的社交网络谣言传播新模型
Yanan Wang, Xiuzhen Chen, Jianhua Li
{"title":"A new genetic-based rumor diffusion model for social networks","authors":"Yanan Wang, Xiuzhen Chen, Jianhua Li","doi":"10.1109/SSIC.2015.7245327","DOIUrl":"https://doi.org/10.1109/SSIC.2015.7245327","url":null,"abstract":"The spreading process of rumor is different from that of general messages because two special factors: reason of individual and rumor refuting, affect the process of rumor dissemination besides conventional factor, i.e. information amount. In this paper, we propose a genetics-based rumor diffusion model (GRDM) which regards an individual with multiple rumors in a network as a `chromosome' which is composed by a set of genes. The GRDM specifies a rule for interactions between chromosomes to model the rumor interactions between individuals. A series of experiments are done on the dynamic social network dataset collected from Sina-Weibo with 9299 users and 215386 pieces of following relationship information between them. The experimental results show that the genetic-algorithm-based rumor diffusion model is reasonable and feasible in demonstrating the diffusion of rumor in social networks and some key factors, i.e. starting node, individual reason and rumor refuting, would affect the propagation process.","PeriodicalId":242945,"journal":{"name":"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130257147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A reputation system for detection of black hole attack in vehicular networking 基于信誉系统的车联网黑洞攻击检测
R. Khatoun, P. Gut, R. Doulami, L. Khoukhi, A. Serhrouchni
{"title":"A reputation system for detection of black hole attack in vehicular networking","authors":"R. Khatoun, P. Gut, R. Doulami, L. Khoukhi, A. Serhrouchni","doi":"10.1109/SSIC.2015.7245328","DOIUrl":"https://doi.org/10.1109/SSIC.2015.7245328","url":null,"abstract":"In recent years, vehicular networks has drawn special attention as it has significant potential to play an important role in future smart city to improve the traffic efficiency and guarantee the road safety. Safety in vehicular networks is crucial because that it affects the life of humans. It is essential like that the vital information cannot be modified or deleted by an attacker and must be also determine the responsibility of drivers while maintaining their privacy. The Black hole attack is a well-known and critical threaten of network availability in vehicular environment. In this paper we present a new reputation system for vehicular networks, where each vehicle reports the packet transmission with its neighbours and the Trust Authority (TA) classifies the reliability of players based on the reports. This reputation system can quickly detect the malicious players in the network, prevent the damage caused by the Black hole attack and improve the effectiveness of routing process.","PeriodicalId":242945,"journal":{"name":"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124665690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Flooding attacks detection in MANETs 城域网泛洪攻击检测
M. Rmayti, Y. Begriche, R. Khatoun, L. Khoukhi, D. Gaïti
{"title":"Flooding attacks detection in MANETs","authors":"M. Rmayti, Y. Begriche, R. Khatoun, L. Khoukhi, D. Gaïti","doi":"10.1109/SSIC.2015.7245675","DOIUrl":"https://doi.org/10.1109/SSIC.2015.7245675","url":null,"abstract":"Flooding attacks are well-known security threats that can lead to a denial of service (DoS) in computer networks. These attacks consist of an excessive traffic generation, by which an attacker aim to disrupt or interrupt some services in the network. The impact of flooding attacks is not just about some nodes, it can be also the whole network. Many routing protocols are vulnerable to these attacks, especially those using reactive mechanism of route discovery, like AODV. In this paper, we propose a statistical approach to defense against RREQ flooding attacks in MANETs. Our detection mechanism can be applied on AODV-based ad hoc networks. Simulation results prove that these attacks can be detected with a low rate of false alerts.","PeriodicalId":242945,"journal":{"name":"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131127218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Classified security protection evaluation for vehicle information system 车辆信息系统分类安全防护评价
Huangmiao Chen, Xiuzhen Chen, Lei Fan, Changsong Chen
{"title":"Classified security protection evaluation for vehicle information system","authors":"Huangmiao Chen, Xiuzhen Chen, Lei Fan, Changsong Chen","doi":"10.1109/SSIC.2015.7245673","DOIUrl":"https://doi.org/10.1109/SSIC.2015.7245673","url":null,"abstract":"This paper firstly analyzes security vulnerabilities, threats and special security requirements of current vehicle information system. And further referring to the classified security protection evaluation standards of traditional information system, we establish classified security protection evaluation system for vehicle information system. This system summarizes typical information assets in car system, divides vehicle information system into two classes/levels: family and business, and defines target and requirement of security protection for two kinds of vehicle information system, respectively. Finally, a series of feasible evaluation methods and tools are presented for evaluation practice. A big contribution of this paper is to explore classified security protection evaluation for vehicle information system and fills up the gap of evaluating security state of automotive information system all over the world.","PeriodicalId":242945,"journal":{"name":"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133976494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A novel Fibonacci windows model for finding emerging patterns over online data stream 一种新的斐波那契窗口模型,用于在在线数据流中发现新出现的模式
Tubagus Mohammad Akhriza, Yinghua Ma, Jianhua Li
{"title":"A novel Fibonacci windows model for finding emerging patterns over online data stream","authors":"Tubagus Mohammad Akhriza, Yinghua Ma, Jianhua Li","doi":"10.1109/SSIC.2015.7245323","DOIUrl":"https://doi.org/10.1109/SSIC.2015.7245323","url":null,"abstract":"Patterns i.e. the itemsets whose frequency increased significantly from one class to another are called emerging patterns (EP). Finding EP in a massive online data streaming is a tough yet complex task. On one hand the emergence of patterns must be examined at different time stamps since no one knows when the patterns may be emerging; on another hand, EP must be found in a given limited time and memory resources. In this work a novel method to accomplish such task is proposed. The history of itemsets and their support is kept in a novel data window model, called Fibonacci windows model, which shrinks a big number of data historical windows into a considerable much smaller number of windows. The emergence of itemsets being extracted from online transactions is examined directly with respect to the Fibonacci windows. Furthermore, as the historical windows are recorded, EP can be found both in online and offline mode.","PeriodicalId":242945,"journal":{"name":"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133545321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信