2015 International Carnahan Conference on Security Technology (ICCST)最新文献

筛选
英文 中文
Techniques for the dynamic randomization of network attributes 网络属性的动态随机化技术
2015 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2015-09-03 DOI: 10.1109/CCST.2015.7389661
A. Chavez, W. Stout, S. Peisert
{"title":"Techniques for the dynamic randomization of network attributes","authors":"A. Chavez, W. Stout, S. Peisert","doi":"10.1109/CCST.2015.7389661","DOIUrl":"https://doi.org/10.1109/CCST.2015.7389661","url":null,"abstract":"Critical infrastructure control systems continue to foster predictable communication paths and static configurations that allow easy access to our networked critical infrastructure around the world. This makes them attractive and easy targets for cyber-attack. We have developed technologies that address these attack vectors by automatically reconfiguring network settings. Applying these protective measures will convert control systems into \"moving targets\" that proactively defend themselves against attack. This \"Moving Target Defense\" (MTD) revolves about the movement of network reconfiguration, securely communicating reconfiguration specifications to other network nodes as required, and ensuring that connectivity between nodes is uninterrupted. Software-defined Networking (SDN) is leveraged to meet many of these goals. Our MTD approach eliminates adversaries targeting known static attributes of network devices and systems, and consists of the following three techniques: (1) Network Randomization for TCP/UDP Ports; (2) Network Randomization for IP Addresses; (3) Network Randomization for Network Paths In this paper, we describe the implementation of the aforementioned technologies. We also discuss the individual and collective successes for the techniques, challenges for deployment, constraints and assumptions, and the performance implications for each technique.","PeriodicalId":292743,"journal":{"name":"2015 International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129992482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Lip-based visual speech recognition system 基于嘴唇的视觉语音识别系统
2015 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2015-09-01 DOI: 10.1109/CCST.2015.7389703
A. Frisky, Chien-Yao Wang, A. Santoso, Jia-Ching Wang
{"title":"Lip-based visual speech recognition system","authors":"A. Frisky, Chien-Yao Wang, A. Santoso, Jia-Ching Wang","doi":"10.1109/CCST.2015.7389703","DOIUrl":"https://doi.org/10.1109/CCST.2015.7389703","url":null,"abstract":"This paper proposes a system to address the problem of visual speech recognition. The proposed system is based on visual lip movement recognition by applying video content analysis technique. Using spatiotemporal features descriptors, we extracted features from video containing visual lip information. A preprocessing step is employed by removing the noise and enhancing the contrast of images in every frames of video. Extracted feature are used to build a dictionary for kernel sparse representation classifier (K-SRC) in the classification step. We adopted non-negative matrix factorization (NMF) method to reduce the dimensionality of the extracted features. We evaluated the performance of our system using AVLetters and AVLetters2 dataset. To evaluate the performance of our system, we used the same configuration as another previous works. Using AVLetters dataset, the promising accuracies of 67.13%, 45.37%, and 63.12% can be achieved in semi speaker dependent, speaker independent, and speaker dependent, respectively. Using AVLetters2 dataset, our method can achieve accuracy rate of 89.02% for speaker dependent case and 25.9% for speaker independent. This result showed that our proposed method outperforms another methods using same configuration.","PeriodicalId":292743,"journal":{"name":"2015 International Carnahan Conference on Security Technology (ICCST)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116150113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Distributed multistage alert correlation architecture based on Hadoop 基于Hadoop的分布式多级预警关联架构
2015 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2015-09-01 DOI: 10.1109/CCST.2015.7389673
J. Rees
{"title":"Distributed multistage alert correlation architecture based on Hadoop","authors":"J. Rees","doi":"10.1109/CCST.2015.7389673","DOIUrl":"https://doi.org/10.1109/CCST.2015.7389673","url":null,"abstract":"There are three main approaches to design when implementing an alert correlation architecture; these are centralised, hierarchical, and decentralised. Centralised approaches benefit from simplicity of implementation and high algorithm expressiveness, but suffer in terms of scalability. The scalability issue is alleviated with hierarchical and decentralised approaches, but this comes at a cost of additional implementation complexity and lower algorithm quality. Introduced is a new alert correlation architecture based on Hadoop. The developed architecture allows for greater scalability whilst maintaining algorithm expressiveness and design simplicity. It incorporates alert aggregation, verification, and correlation components, which together provide for a clear and succinct view of potentially malicious activity. Each component was tested against a series of datasets that represent potential real world scenarios across a cluster of varying size. The results demonstrate that all components in the architecture have the ability to scale across many nodes in a cluster, allowing for the processing of large and complex attack scenarios in a timely manner.","PeriodicalId":292743,"journal":{"name":"2015 International Carnahan Conference on Security Technology (ICCST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117315385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A goal-driven approach to modeling security concerns in network management system 网络管理系统中安全问题建模的目标驱动方法
2015 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2015-09-01 DOI: 10.1109/CCST.2015.7389669
Chia-Ling Wu
{"title":"A goal-driven approach to modeling security concerns in network management system","authors":"Chia-Ling Wu","doi":"10.1109/CCST.2015.7389669","DOIUrl":"https://doi.org/10.1109/CCST.2015.7389669","url":null,"abstract":"Recently, aspect-oriented approaches have resulted in a tremendous impact on the processing of broadly-scoped properties during the development of software systems. However, the semantics of weaving these crosscutting concerns into models of software designs cannot easily be represented with the extent of UML notation at the early stage of software development life-cycle. As an attempt towards the investigation of how the crosscutting behavior takes place, I proposed, in this work, a goal-driven approach to modeling aspectual behavior (specifically, security concerns) in UML behavioral diagrams with the proposed interaction operators based on the aspectual weaving semantics. To further exemplify my points, the network management system is chosen as a vehicle to illustrate the proposed approach.","PeriodicalId":292743,"journal":{"name":"2015 International Carnahan Conference on Security Technology (ICCST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128611189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Benefit of construct information security environment based on lightweight virtualization technology 基于轻量级虚拟化技术构建信息安全环境的好处
2015 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2015-09-01 DOI: 10.1109/CCST.2015.7389695
Jen-Chieh Wang, Weipeng Cheng, Hanteng Chen, Hung-Li Chien
{"title":"Benefit of construct information security environment based on lightweight virtualization technology","authors":"Jen-Chieh Wang, Weipeng Cheng, Hanteng Chen, Hung-Li Chien","doi":"10.1109/CCST.2015.7389695","DOIUrl":"https://doi.org/10.1109/CCST.2015.7389695","url":null,"abstract":"Recently, in order to strengthen the capabilities of security defense and emergency coordination, training in a virtual environment is more and more important. In a virtual environment, the trainee can operate the really system. The answer of how to attack or defend is no more just one solution. You can use any method or trick to reach the goal. The outcome of training in a virtual environment can directly prove the trainee's capability. Although there is a lot of advantage to use virtual environment, it's a big problem to build it. The work of creating virtual environment includes allocation and maintenance. To allocation, because training in an environment providing daily service will decrease the performance of service. It's hard to allocate virtual environment in a real environment providing daily service. In order to simulate the real environment, it needs a lot of space and powerful computing. To maintenance, the built virtual environment needs expandable, flexibility and reusable. For example, it can change IP or count/password easily so the test would not always the same and virtual environments can be reusable. For now, it use cloud computing[8] to virtualize the virtual environment to solve the two problem. But there is still a problem of too heavy. In this research, we try to build virtual environment based on Docker which provide manager a structured process to build a virtual environment by building a independent containers and Open vSwitch in the operating system layer. We can monitor the status of virtual environment with charts so the manager can control the system more effective and help researchers or military to do security education.","PeriodicalId":292743,"journal":{"name":"2015 International Carnahan Conference on Security Technology (ICCST)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114865878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Digital Triage Forensics framework of Window malware forensic toolkit: Based on ISO/IEC 27037:2012 windows恶意软件取证工具包的数字分类取证框架:基于ISO/IEC 27037:2012
2015 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2015-09-01 DOI: 10.1109/CCST.2015.7389685
Da-Yu Kao, Guan-Jie Wu
{"title":"A Digital Triage Forensics framework of Window malware forensic toolkit: Based on ISO/IEC 27037:2012","authors":"Da-Yu Kao, Guan-Jie Wu","doi":"10.1109/CCST.2015.7389685","DOIUrl":"https://doi.org/10.1109/CCST.2015.7389685","url":null,"abstract":"The rise of malware attack and data leakage is putting the Internet at a higher risk. Digital forensic examiners responsible for cyber security incident need to continually update their processes, knowledge and tools due to changing technology. These attack activities can be investigated by means of Digital Triage Forensics (DTF) methodologies. DTF is a procedural model for the crime scene investigation of digital forensic applications. It takes place as a way of gathering quick intelligence, and presents methods of conducting pre/post-blast investigations. A DTF framework of Window malware forensic toolkit is further proposed. It is also based on ISO/IEC 27037: 2012 - guidelines for specific activities in the handling of digital evidence. The argument is made for a careful use of digital forensic investigations to improve the overall quality of expert examiners. This solution may improve the speed and quality of pre/post-blast investigations. By considering how triage solutions are being implemented into digital investigations, this study presents a critical analysis of malware forensics. The analysis serves as feedback for integrating digital forensic considerations, and specifies directions for further standardization efforts.","PeriodicalId":292743,"journal":{"name":"2015 International Carnahan Conference on Security Technology (ICCST)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131748059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy-preserving proof of storage in large group 大组存储的隐私保护证明
2015 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2015-09-01 DOI: 10.1109/CCST.2015.7389694
Yongjun Ren, Jin Han, Jin Wang, Liming Fang
{"title":"Privacy-preserving proof of storage in large group","authors":"Yongjun Ren, Jin Han, Jin Wang, Liming Fang","doi":"10.1109/CCST.2015.7389694","DOIUrl":"https://doi.org/10.1109/CCST.2015.7389694","url":null,"abstract":"Cloud storage is an important development trend in information technology. To ensure the integrity of data storage in cloud storing, researchers have present some proof of storage (POS) schemes. In some cases, the ability to check data possession is delegated by data owners. Hence, the delegable provable data possession and proxy provable data possession are proposed. However the existing schemes are not secure since the proxy or designated verifier stores some delegation information in cloud storage servers. In this paper, we propose a new POS scheme, which can preserve clients' privacy and only members in the data shared group to verify the integrity of the outsourced data. In particular, we utilize group signatures and group key exchange to construct homomorphic authenticators, so that only the members in the group is able to check the integrity of shared data for users without retrieving the entire data, and cannot reveal the identities of signers on all blocks in shared data.","PeriodicalId":292743,"journal":{"name":"2015 International Carnahan Conference on Security Technology (ICCST)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127649749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Atomizing apparatus for development of latent fingerprints 潜在指纹显影用雾化装置
2015 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2015-09-01 DOI: 10.1109/CCST.2015.7389697
Chih Julie Wang, A. H. Li, Ming-Chih Wang, Cheng-Lung Lee
{"title":"Atomizing apparatus for development of latent fingerprints","authors":"Chih Julie Wang, A. H. Li, Ming-Chih Wang, Cheng-Lung Lee","doi":"10.1109/CCST.2015.7389697","DOIUrl":"https://doi.org/10.1109/CCST.2015.7389697","url":null,"abstract":"This research focuses on using an atomizing apparatus to develop latent fingerprints. The atomizing apparatus for the development of latent fingerprints is an innovative device. This device improves conventional apparatus by providing safer and more efficient practices than those most adopted conventional ones including powder development method, Ninhydrin method, and smoke fuming method. Taking the smoke fuming method as an example, the conventional procedure is to heat up cyanoacrylate to react with fingerprint residues in order to visualize latent fingerprints. Conventional methods utilizing heat can be dangerous to technicians while our atomizing apparatus does not use heat but high frequency vibration, increasing workplace safety. The atomizing apparatus comprises a container which has an opening and a housing space communicating with the opening, a trace evidence developing solution held in the housing space to develop latent fingerprints and an atomizer located in the opening. The atomizer includes a piezoelectric vibration element in contact with the trace evidence developing solution. The piezoelectric vibration element can shake the trace evidence developing solution via high frequency vibration to form a plurality of small liquid particles to be discharged outside the container. The small liquid particles of the trace evidence developing solution pass through the opening and spray directly on the latent fingerprints to generate an oxidized reduction reaction therewith produce colored substance to reveal the latent fingerprints in a visible fashion. In short, the advantages of operating this innovative atomizing apparatus, which use high frequency vibration instead of dangerous heats, include: 1) no size limitation of the intended test objects, 2) low energy consumption and 3) the facts that the apparatus which can work more efficiently is easy to carry around and biological trace evidences can be revealed in a visible fashion.","PeriodicalId":292743,"journal":{"name":"2015 International Carnahan Conference on Security Technology (ICCST)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114700035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A composite guidance for dual range AAM with side jet control 一种具有侧喷控制的双程空空导弹复合制导
2015 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2015-09-01 DOI: 10.1109/CCST.2015.7389680
Der-ren Taur, Chung-Hsin Cheng
{"title":"A composite guidance for dual range AAM with side jet control","authors":"Der-ren Taur, Chung-Hsin Cheng","doi":"10.1109/CCST.2015.7389680","DOIUrl":"https://doi.org/10.1109/CCST.2015.7389680","url":null,"abstract":"The dual range air-to-air missile (DRAAM) is a next-generation AAM concept capable of all-aspect target intercept at very close range, as well as beyond visual range (BVR). A composite guidance strategy for DRAAM with initial side jet control (SJC) is synthesized in this study. The initial side jet thrusters integrated into the aft section of the rocket motor are used when high levels of agility are required to engage such as over-the-shoulder engagement. For this short range all-aspect engagement, a sliding mode agile turn guidance law in the yaw plane is invoked to perform the high-angle-of-attack maneuver in 2.5 seconds. On the other hand, for the beyond visual range (BVR) engagement, a simplified version of singular perturbation (SP) optimal midcourse guidance law based on the composite control approach is proposed. During the homing phase, a composite homing guidance strategy is presented. A traditional PN guidance law is utilized first, and then a bounded differential game (BDG) homing guidance law with aero control is proposed in this study for the purpose of hit-to-kill end game performance.","PeriodicalId":292743,"journal":{"name":"2015 International Carnahan Conference on Security Technology (ICCST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117163262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The dynamic biometric signature — Is the biometric data in the created signature constant? 动态生物特征签名—所创建签名中的生物特征数据是否恒定?
2015 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2015-09-01 DOI: 10.1109/CCST.2015.7389715
V. Smejkal, L. Sieger, J. Kodl, D. Novák, Jakub Schneider
{"title":"The dynamic biometric signature — Is the biometric data in the created signature constant?","authors":"V. Smejkal, L. Sieger, J. Kodl, D. Novák, Jakub Schneider","doi":"10.1109/CCST.2015.7389715","DOIUrl":"https://doi.org/10.1109/CCST.2015.7389715","url":null,"abstract":"Biometric authentication methods are increasingly proving to be a sensible compromise between the demands on the user and/or the authentication tools without reducing the level of security. Dynamic biometric signature (DBS) systems record data from the handwritten signature using special tools which enable an analysis of both the static and dynamic properties associated with the typical behaviour of the signing individual. In our previous ICCST paper (Rome, 2014) we have undertaken fundamental experiments demonstrating the uniqueness of the DBS and its resistance to forgery. Limitation of this experiment was the significance homogeneity of the used test group consisting of students from the Cybernetics Department at the Technical University in Prague. Further experiments have been undertaken with the same content, but using an absolutely heterogeneous group consisting of men and women of different ages, levels of education and professions in order to show whether the uniqueness and resistance to forgery is preserved in the DBS even in this case. A no less significant aspect when assessing the properties of the DBS is the question of the immutability and duplicability of the already created biometric data. Further questions still arise as to the degree to which the characteristics of the DBS will change when the given individual is subjected to various influences. Our experiments have therefore focused on the creation of various conditions when signing and on monitoring their influence on the stability of the researched individual's DBS. In our paper we present the results of experiments that have the considerable importance in terms of DBS credibility when being used in authentication of users.","PeriodicalId":292743,"journal":{"name":"2015 International Carnahan Conference on Security Technology (ICCST)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127232112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信