N. Hanebutte, Paul Oman, Michael Loosbrock, Austin Holland, W. S. Harrison, Jim Alves-Foss
{"title":"Software mediators for transparent channel control in unbounded environments","authors":"N. Hanebutte, Paul Oman, Michael Loosbrock, Austin Holland, W. S. Harrison, Jim Alves-Foss","doi":"10.1109/IAW.2005.1495953","DOIUrl":"https://doi.org/10.1109/IAW.2005.1495953","url":null,"abstract":"Establishing verifiably secure communications is a daunting task, especially in unbounded computing networks such as the Internet and the global information grid. The multiple independent levels of security (MILS) architecture has been developed to facilitate this task. Wrappers, filters and mediators, both hardware and software, have been proposed as MILS mechanisms to enforce communication security policies such as data isolation and sanitation. This paper describes two experimental projects showing how software mediators can be implemented using CORBA in two different environments: a standard Unix TCP/IP network with multiple workstations, and a single board computer running the integrity operating system with a separation kernel supporting multiple isolated execution environments. The first example shows how protocol mediators can enforce communication-related security policies on standard networks, while the second shows that same functionality implemented on a MILS-based architecture. The projects show how transparent communication security policies can be implemented with existing technologies and without any modifications to the operating system kernels.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125902877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discovering multivariate linear relationship securely","authors":"Ningning Wu, Jing Zhang, Li Ning","doi":"10.1109/IAW.2005.1495989","DOIUrl":"https://doi.org/10.1109/IAW.2005.1495989","url":null,"abstract":"This paper considers the privacy-preserving cooperative linear system of equations (PPC-LSE) problem in a large, heterogeneous, distributed database scenario. It proposes a privacy-preserving algorithm to discover multivariate linear relationship based on factor analysis. Compared with other PPC-LSE algorithms, the proposed algorithm not only significantly reduces the communication cost, but also avoids the random matrix generation of either party to hide private information.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128486744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A guarded cross-site mining architecture of systems security information","authors":"R. Goel, J. Humphries","doi":"10.1109/IAW.2005.1495996","DOIUrl":"https://doi.org/10.1109/IAW.2005.1495996","url":null,"abstract":"This research effort provides a framework for a system that can securely fuse the intelligence from these sources, while completing the computing and communication in an efficient manner. We develop an architecture for a guarded cross-site mining system; this is designed to extract patterns and attack/intrusion indications as possible and utilize parallel processing of all relevant information available, while protecting sensitive information. This solution harnesses the power of the distributed computing environment by applying expert systems locally before aggregating data (instead of processing all at once at one central location). Furthermore, previously established theories for privacy preserving data mining may now be utilized for information assurance purposes.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116580009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning classifiers for misuse and anomaly detection using a bag of system calls representation","authors":"Dae-Ki Kang, D. Fuller, Vasant G Honavar","doi":"10.1109/IAW.2005.1495942","DOIUrl":"https://doi.org/10.1109/IAW.2005.1495942","url":null,"abstract":"In this paper, we propose a \"bag of system calls\" representation for intrusion detection in system call sequences and describe misuse and anomaly detection results with standard machine learning techniques on University of New Mexico (UNM) and MIT Lincoln Lab (MIT LL) system call sequences with the proposed representation. With the feature representation as input, we compare the performance of several machine learning techniques for misuse detection and show experimental results on anomaly detection. The results show that standard machine learning and clustering techniques on simple \"bag of system calls\" representation of system call sequences is effective and often performs better than those approaches that use foreign contiguous subsequences in detecting intrusive behaviors of compromised processes.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125627433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Brownfield, Yatharth Gupta, Nathaniel Davis, Senior Member
{"title":"Wireless sensor network denial of sleep attack","authors":"M. Brownfield, Yatharth Gupta, Nathaniel Davis, Senior Member","doi":"10.1109/IAW.2005.1495974","DOIUrl":"https://doi.org/10.1109/IAW.2005.1495974","url":null,"abstract":"With the progression of computer networks extending boundaries and joining distant locations, wireless sensor networks (WSN) emerge as the new frontier in developing opportunities to collect and process data from remote locations. Like IEEE 802.3 wired and IEEE 802.11 wireless networks, remote wireless sensor networks are vulnerable to malicious attacks. While wired and infrastructure-based wireless networks have mature intrusion detection systems and sophisticated firewalls to block these attacks, wireless sensor networks have only primitive defenses. WSNs rely on hardware simplicity to make sensor field deployments both affordable and long-lasting without any maintenance support. Energy-constrained sensor networks periodically place nodes to sleep in order to extend the network lifetime. Denying sleep effectively attacks each sensor node's critical energy resources and rapidly drains the network's lifetime. This paper analyzes the energy resource vulnerabilities of wireless sensor networks, models the network lifetimes of leading WSN medium access control (MAC) protocols, and proposes a new MAC protocol which mitigates many of the effects of denial of sleep attacks.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130997560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Making garbage collection dependable through a run-time monitor","authors":"C. Lo","doi":"10.1109/IAW.2005.1495983","DOIUrl":"https://doi.org/10.1109/IAW.2005.1495983","url":null,"abstract":"This paper examines Java security models and describes security issues in garbage collection, memory metrics used to predict program behaviors, and their relations. These metrics are collected and analyzed at run-time to assure dependability. Undependable factors come from heap memory attacks which are introduced and classified into \"slow death\" and \"fast death\" categories. \"Slow death\" is to chronic diseases what \"fast death\" is to sudden death. \"Slow death\" causes programs dying; \"fast death\" terminates a program. These are potential scenarios if garbage collection is under attack. Experimental studies show that garbage collection may be invoked 27 times more than the normal situation. Furthermore, presented is a run-time monitoring system that can detect anomalous program behaviors using the collected memory metrics. This can be a run-time throttle that controls program behaviors and a postmortem diagnosis technique in case of heap memory attacks.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127092529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visualizing network data for intrusion detection","authors":"K. Abdullah, C. Lee, G. Conti, J. Copeland","doi":"10.1109/IAW.2005.1495940","DOIUrl":"https://doi.org/10.1109/IAW.2005.1495940","url":null,"abstract":"As the trend of successful network attacks continue to rise, better forms of intrusion detection and prevention are needed. This paper addresses network traffic visualization techniques that aid an administrator in recognizing attacks in real time. Our approach improves upon current techniques that lack effectiveness due to an overemphasis on flow, nodes, or assumed familiarity with the attack tool, causing either late reaction or missed detection. A port-based overview of network activity produces a improved representation for detecting and responding to malicious activity. We have found that presenting an overview using stacked histograms of aggregate port activity, combined with the ability to drill-down for finer details allows small, yet important details to be noticed and investigated without being obscured by large, usual traffic. Due to the amount of traffic as well as the range of possible port numbers and IP addresses, scaling techniques are necessary to help provide this overview. We provide graphs with examples of forensic findings. Finally, we describe our future plans for using live traffic in addition to our forensic visualization techniques.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132907228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adopting eXtreme programming on a graduate student project","authors":"B. Endicott-Popovsky, C. Seifert","doi":"10.1109/IAW.2005.1495998","DOIUrl":"https://doi.org/10.1109/IAW.2005.1495998","url":null,"abstract":"This paper discusses a pedagogical process that addresses the problem of how to facilitate learning of a relatively new development methodology that has a limited base of practitioners to draw from and perhaps no faculty with direct experience. This problem is not new to computer science faculty. Change in the field is constant and practitioners must be learning, continually.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115513996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey: security in the system development life cycle","authors":"Suhair Amer, J. W. Humphries, J. Hamilton","doi":"10.1109/IAW.2005.1495968","DOIUrl":"https://doi.org/10.1109/IAW.2005.1495968","url":null,"abstract":"A general approach to security architecture is introduced. A survey of existing attempts to develop the security architecture introduces the topic. Security can be highlighted as part of the system development life cycle. The authors assume that security cannot be achieved by concentrating on one system component but can be achieved by identifying the relationship between these components and how information is used among them. An original sphere of use and interaction is presented upon which security measures can be evaluated and the required security controls can be chosen.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123846771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless provisioning in hostile RF environments","authors":"M. Kershaw, K. Keville","doi":"10.1109/IAW.2005.1495973","DOIUrl":"https://doi.org/10.1109/IAW.2005.1495973","url":null,"abstract":"In this document we propose a new wireless access point (WAP) design, the SmartAP, which provides a high quality and quantity of client access in a wireless local area network (WLAN) but which also assures a heretofore unparalleled level of security and uptime because of novel emplacement and management of multiple transceivers.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116404672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}