Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop最新文献

筛选
英文 中文
Software mediators for transparent channel control in unbounded environments 在无界环境中用于透明通道控制的软件中介器
Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop Pub Date : 2005-06-15 DOI: 10.1109/IAW.2005.1495953
N. Hanebutte, Paul Oman, Michael Loosbrock, Austin Holland, W. S. Harrison, Jim Alves-Foss
{"title":"Software mediators for transparent channel control in unbounded environments","authors":"N. Hanebutte, Paul Oman, Michael Loosbrock, Austin Holland, W. S. Harrison, Jim Alves-Foss","doi":"10.1109/IAW.2005.1495953","DOIUrl":"https://doi.org/10.1109/IAW.2005.1495953","url":null,"abstract":"Establishing verifiably secure communications is a daunting task, especially in unbounded computing networks such as the Internet and the global information grid. The multiple independent levels of security (MILS) architecture has been developed to facilitate this task. Wrappers, filters and mediators, both hardware and software, have been proposed as MILS mechanisms to enforce communication security policies such as data isolation and sanitation. This paper describes two experimental projects showing how software mediators can be implemented using CORBA in two different environments: a standard Unix TCP/IP network with multiple workstations, and a single board computer running the integrity operating system with a separation kernel supporting multiple isolated execution environments. The first example shows how protocol mediators can enforce communication-related security policies on standard networks, while the second shows that same functionality implemented on a MILS-based architecture. The projects show how transparent communication security policies can be implemented with existing technologies and without any modifications to the operating system kernels.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125902877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Discovering multivariate linear relationship securely 安全地发现多元线性关系
Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop Pub Date : 2005-06-15 DOI: 10.1109/IAW.2005.1495989
Ningning Wu, Jing Zhang, Li Ning
{"title":"Discovering multivariate linear relationship securely","authors":"Ningning Wu, Jing Zhang, Li Ning","doi":"10.1109/IAW.2005.1495989","DOIUrl":"https://doi.org/10.1109/IAW.2005.1495989","url":null,"abstract":"This paper considers the privacy-preserving cooperative linear system of equations (PPC-LSE) problem in a large, heterogeneous, distributed database scenario. It proposes a privacy-preserving algorithm to discover multivariate linear relationship based on factor analysis. Compared with other PPC-LSE algorithms, the proposed algorithm not only significantly reduces the communication cost, but also avoids the random matrix generation of either party to hide private information.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128486744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A guarded cross-site mining architecture of systems security information 一种系统安全信息的防护跨站点挖掘架构
Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop Pub Date : 2005-06-15 DOI: 10.1109/IAW.2005.1495996
R. Goel, J. Humphries
{"title":"A guarded cross-site mining architecture of systems security information","authors":"R. Goel, J. Humphries","doi":"10.1109/IAW.2005.1495996","DOIUrl":"https://doi.org/10.1109/IAW.2005.1495996","url":null,"abstract":"This research effort provides a framework for a system that can securely fuse the intelligence from these sources, while completing the computing and communication in an efficient manner. We develop an architecture for a guarded cross-site mining system; this is designed to extract patterns and attack/intrusion indications as possible and utilize parallel processing of all relevant information available, while protecting sensitive information. This solution harnesses the power of the distributed computing environment by applying expert systems locally before aggregating data (instead of processing all at once at one central location). Furthermore, previously established theories for privacy preserving data mining may now be utilized for information assurance purposes.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116580009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning classifiers for misuse and anomaly detection using a bag of system calls representation 使用一组系统调用表示学习误用分类器和异常检测
Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop Pub Date : 2005-06-15 DOI: 10.1109/IAW.2005.1495942
Dae-Ki Kang, D. Fuller, Vasant G Honavar
{"title":"Learning classifiers for misuse and anomaly detection using a bag of system calls representation","authors":"Dae-Ki Kang, D. Fuller, Vasant G Honavar","doi":"10.1109/IAW.2005.1495942","DOIUrl":"https://doi.org/10.1109/IAW.2005.1495942","url":null,"abstract":"In this paper, we propose a \"bag of system calls\" representation for intrusion detection in system call sequences and describe misuse and anomaly detection results with standard machine learning techniques on University of New Mexico (UNM) and MIT Lincoln Lab (MIT LL) system call sequences with the proposed representation. With the feature representation as input, we compare the performance of several machine learning techniques for misuse detection and show experimental results on anomaly detection. The results show that standard machine learning and clustering techniques on simple \"bag of system calls\" representation of system call sequences is effective and often performs better than those approaches that use foreign contiguous subsequences in detecting intrusive behaviors of compromised processes.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125627433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 164
Wireless sensor network denial of sleep attack 无线传感器网络拒绝睡眠攻击
Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop Pub Date : 2005-06-15 DOI: 10.1109/IAW.2005.1495974
M. Brownfield, Yatharth Gupta, Nathaniel Davis, Senior Member
{"title":"Wireless sensor network denial of sleep attack","authors":"M. Brownfield, Yatharth Gupta, Nathaniel Davis, Senior Member","doi":"10.1109/IAW.2005.1495974","DOIUrl":"https://doi.org/10.1109/IAW.2005.1495974","url":null,"abstract":"With the progression of computer networks extending boundaries and joining distant locations, wireless sensor networks (WSN) emerge as the new frontier in developing opportunities to collect and process data from remote locations. Like IEEE 802.3 wired and IEEE 802.11 wireless networks, remote wireless sensor networks are vulnerable to malicious attacks. While wired and infrastructure-based wireless networks have mature intrusion detection systems and sophisticated firewalls to block these attacks, wireless sensor networks have only primitive defenses. WSNs rely on hardware simplicity to make sensor field deployments both affordable and long-lasting without any maintenance support. Energy-constrained sensor networks periodically place nodes to sleep in order to extend the network lifetime. Denying sleep effectively attacks each sensor node's critical energy resources and rapidly drains the network's lifetime. This paper analyzes the energy resource vulnerabilities of wireless sensor networks, models the network lifetimes of leading WSN medium access control (MAC) protocols, and proposes a new MAC protocol which mitigates many of the effects of denial of sleep attacks.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130997560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 158
Making garbage collection dependable through a run-time monitor 通过运行时监视器使垃圾收集可靠
Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop Pub Date : 2005-06-15 DOI: 10.1109/IAW.2005.1495983
C. Lo
{"title":"Making garbage collection dependable through a run-time monitor","authors":"C. Lo","doi":"10.1109/IAW.2005.1495983","DOIUrl":"https://doi.org/10.1109/IAW.2005.1495983","url":null,"abstract":"This paper examines Java security models and describes security issues in garbage collection, memory metrics used to predict program behaviors, and their relations. These metrics are collected and analyzed at run-time to assure dependability. Undependable factors come from heap memory attacks which are introduced and classified into \"slow death\" and \"fast death\" categories. \"Slow death\" is to chronic diseases what \"fast death\" is to sudden death. \"Slow death\" causes programs dying; \"fast death\" terminates a program. These are potential scenarios if garbage collection is under attack. Experimental studies show that garbage collection may be invoked 27 times more than the normal situation. Furthermore, presented is a run-time monitoring system that can detect anomalous program behaviors using the collected memory metrics. This can be a run-time throttle that controls program behaviors and a postmortem diagnosis technique in case of heap memory attacks.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127092529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visualizing network data for intrusion detection 可视化网络数据用于入侵检测
Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop Pub Date : 2005-06-15 DOI: 10.1109/IAW.2005.1495940
K. Abdullah, C. Lee, G. Conti, J. Copeland
{"title":"Visualizing network data for intrusion detection","authors":"K. Abdullah, C. Lee, G. Conti, J. Copeland","doi":"10.1109/IAW.2005.1495940","DOIUrl":"https://doi.org/10.1109/IAW.2005.1495940","url":null,"abstract":"As the trend of successful network attacks continue to rise, better forms of intrusion detection and prevention are needed. This paper addresses network traffic visualization techniques that aid an administrator in recognizing attacks in real time. Our approach improves upon current techniques that lack effectiveness due to an overemphasis on flow, nodes, or assumed familiarity with the attack tool, causing either late reaction or missed detection. A port-based overview of network activity produces a improved representation for detecting and responding to malicious activity. We have found that presenting an overview using stacked histograms of aggregate port activity, combined with the ability to drill-down for finer details allows small, yet important details to be noticed and investigated without being obscured by large, usual traffic. Due to the amount of traffic as well as the range of possible port numbers and IP addresses, scaling techniques are necessary to help provide this overview. We provide graphs with examples of forensic findings. Finally, we describe our future plans for using live traffic in addition to our forensic visualization techniques.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132907228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
Adopting eXtreme programming on a graduate student project 在研究生项目中采用极限编程
Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop Pub Date : 2005-06-15 DOI: 10.1109/IAW.2005.1495998
B. Endicott-Popovsky, C. Seifert
{"title":"Adopting eXtreme programming on a graduate student project","authors":"B. Endicott-Popovsky, C. Seifert","doi":"10.1109/IAW.2005.1495998","DOIUrl":"https://doi.org/10.1109/IAW.2005.1495998","url":null,"abstract":"This paper discusses a pedagogical process that addresses the problem of how to facilitate learning of a relatively new development methodology that has a limited base of practitioners to draw from and perhaps no faculty with direct experience. This problem is not new to computer science faculty. Change in the field is constant and practitioners must be learning, continually.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115513996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Survey: security in the system development life cycle 调查:系统开发生命周期中的安全性
Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop Pub Date : 2005-06-15 DOI: 10.1109/IAW.2005.1495968
Suhair Amer, J. W. Humphries, J. Hamilton
{"title":"Survey: security in the system development life cycle","authors":"Suhair Amer, J. W. Humphries, J. Hamilton","doi":"10.1109/IAW.2005.1495968","DOIUrl":"https://doi.org/10.1109/IAW.2005.1495968","url":null,"abstract":"A general approach to security architecture is introduced. A survey of existing attempts to develop the security architecture introduces the topic. Security can be highlighted as part of the system development life cycle. The authors assume that security cannot be achieved by concentrating on one system component but can be achieved by identifying the relationship between these components and how information is used among them. An original sphere of use and interaction is presented upon which security measures can be evaluated and the required security controls can be chosen.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123846771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Wireless provisioning in hostile RF environments 恶劣射频环境下的无线供应
Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop Pub Date : 2005-06-15 DOI: 10.1109/IAW.2005.1495973
M. Kershaw, K. Keville
{"title":"Wireless provisioning in hostile RF environments","authors":"M. Kershaw, K. Keville","doi":"10.1109/IAW.2005.1495973","DOIUrl":"https://doi.org/10.1109/IAW.2005.1495973","url":null,"abstract":"In this document we propose a new wireless access point (WAP) design, the SmartAP, which provides a high quality and quantity of client access in a wireless local area network (WLAN) but which also assures a heretofore unparalleled level of security and uptime because of novel emplacement and management of multiple transceivers.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116404672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信