2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)最新文献

筛选
英文 中文
A Case Study for Practical Issues of DCT Based Bitmap Selective Encryption Methods 基于DCT的位图选择性加密方法的实例研究
Han Qiu, Nathalie Enfrin, G. Memmi
{"title":"A Case Study for Practical Issues of DCT Based Bitmap Selective Encryption Methods","authors":"Han Qiu, Nathalie Enfrin, G. Memmi","doi":"10.1109/SSIC.2018.8556828","DOIUrl":"https://doi.org/10.1109/SSIC.2018.8556828","url":null,"abstract":"Selective Encryption (SE) methods are mainly used for protecting multimedia contents. One approach, DCT based SE methods, is exploited for image protection especially bitmap protection use case in many previous works. The special focus of our investigation is looking into two main practical issues ignored by existing DCT based SE methods: rounding errors and recovery from non-selected DCT coefficients. In this paper, we re-implement previous work and present the issue or rounding errors with a practical implementation. According to our work, the rounding errors due to truncation operations inside the DCT based SE cannot be ignored although multimedia contents can tolerate some level of noise introduced. Also, we improved recovery methods that can recover visual elements of an image by guessing the DC coefficients from only a small set of known high frequency AC coefficients. It is shown that some published DCT based SE methods are not reliable for a high level of protection purpose even they protect low frequency coefficients representing 99% of the energy in frequency domain.","PeriodicalId":302563,"journal":{"name":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132038876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Classification of botnet families based on features self-learning under Network Traffic Censorship 网络流量审查下基于特征自学习的僵尸网络家族分类
Zhi Zhou, Lihong Yao, Jianhua Li, B. Hu, Chen Wang, Zhenglong Wang
{"title":"Classification of botnet families based on features self-learning under Network Traffic Censorship","authors":"Zhi Zhou, Lihong Yao, Jianhua Li, B. Hu, Chen Wang, Zhenglong Wang","doi":"10.1109/SSIC.2018.8556792","DOIUrl":"https://doi.org/10.1109/SSIC.2018.8556792","url":null,"abstract":"Network encryption traffic security censorship is an indispensable part of Internet security. The accuracy and speed of the censorship is a very important requirement. In the actual censorship environment, there is much unknown protocol traffic so that the existing method of artificial designing features cannot satisfy the classification of unknown protocols. CNN can automatically learn features and use them to construct the classification algorithm of the model. CNN has strict requirements on input and we divide the original traffic to numbers of sessions which have a size as large as 400 bytes for each. We do some experiments to get this result, 400-byte size and get a series of inspiring results. We get 64 feature maps automatically learned by CNN, which verify our thoughts on feature self-learning. The classification results meet the requirements of network traffic censorship. This is the first time that CNN has been used to classify botnet encrypted and unencrypted traffic, and the focus of research is on features self-learning. This has implications for the future research of artificial intelligence methods on botnet and provides a reference.","PeriodicalId":302563,"journal":{"name":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114799101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Group based Dynamic Mix Zone Scheme for Location Privacy Preservation in VANETs 一种基于分组的vanet位置隐私保护动态混合分区方案
Qingyuan Li, Hao Wu, Lei Liu, Bin Pan, Lan Dong
{"title":"A Group based Dynamic Mix Zone Scheme for Location Privacy Preservation in VANETs","authors":"Qingyuan Li, Hao Wu, Lei Liu, Bin Pan, Lan Dong","doi":"10.1109/SSIC.2018.8556784","DOIUrl":"https://doi.org/10.1109/SSIC.2018.8556784","url":null,"abstract":"Modern vehicles are equipped with wireless communication technologies, allowing them to communicate with each other. Through Dedicated Short Range Communication (DSRC), vehicles periodically broadcast beacons messages for safety applications, which gives rise to disclosure of location privacy. A way to protect vehicles location privacy is to have their pseudonyms changed frequently. With restrict to limited resources (such as computation and storage), we propose a group based dynamic mix zone scheme, in which vehicles form a group when their pseudonyms are close to expire. Simulation results confirm that the proposed scheme can protect location privacy and alleviate the storage burden.","PeriodicalId":302563,"journal":{"name":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121734619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Image Mapping through Metadata 通过元数据映射图像
Caleb Riggs, Tanner Douglas, K. Gagneja
{"title":"Image Mapping through Metadata","authors":"Caleb Riggs, Tanner Douglas, K. Gagneja","doi":"10.1109/SSIC.2018.8556664","DOIUrl":"https://doi.org/10.1109/SSIC.2018.8556664","url":null,"abstract":"Image metadata is an important piece of information in any digital investigation process. It can tell you information about where a picture was taken, what time it was taken, what device took the picture, and so much more. In this research paper we have designed and developed a java application to help aid investigators by pulling relevant metadata out of a set of images inside a folder. Once this metadata was retrieved, we displayed it in a user friendly fashion with the goal being to help an investigator draw insight into the pictures that were taken. One method for helping insight be drawn easier was implementing the google maps API in a javafx front end.","PeriodicalId":302563,"journal":{"name":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129497891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Multi-SDN Based Cooperation Scheme for DDoS Attack Defense 基于多sdn的DDoS攻击防范协同方案
Boren He, Futai Zou, Yue Wu
{"title":"Multi-SDN Based Cooperation Scheme for DDoS Attack Defense","authors":"Boren He, Futai Zou, Yue Wu","doi":"10.1109/SSIC.2018.8556830","DOIUrl":"https://doi.org/10.1109/SSIC.2018.8556830","url":null,"abstract":"Distributed Denial of Service (DDoS) attack is one of the most severe threat in current internet. Software Defined Network (SDN) is novel network structure based on the idea of separation of control plane and data plane. SDN allows us to program and monitor networks, and decide how to forward a packet, so it provides a new solution to defend DDoS attack. This paper proposes a multi-SDN Based cooperation scheme to defend DDoS attack. We adopt machine learning to detect DDoS attack, and design a protocol to enable communication among controllers. This protocol can achieve two goals, one is to build and maintain an independent network among controllers of different SDN, and the other is to enable attack information exchange among controllers, so they can find attacker and mitigate DDoS attack. The experimental results show that the proposed protocol can achieve high detection accuracy, find attackers accurately and mitigate DDoS attack traffic effectively with a relatively low cost and latency.","PeriodicalId":302563,"journal":{"name":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127794187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Research and Applications of the Key Technology of Intelligent Operation and Maintenance System Architecture for Transmission Power Cables 输电电缆智能运维系统体系结构关键技术研究与应用
Chenbin Wu, Yunjie Zhou, Xiaojuan Jiang, Y. Xu, Xiaodi Wang, He He
{"title":"Research and Applications of the Key Technology of Intelligent Operation and Maintenance System Architecture for Transmission Power Cables","authors":"Chenbin Wu, Yunjie Zhou, Xiaojuan Jiang, Y. Xu, Xiaodi Wang, He He","doi":"10.1109/SSIC.2018.8556679","DOIUrl":"https://doi.org/10.1109/SSIC.2018.8556679","url":null,"abstract":"In order to facilitate the construction of smart city, it is important for electric utility to improve the management level of operation and maintenance(O& M) for transmission power cables(TPC). Regular practices are to develop relative power cables and channels monitoring systems by using geographic information system technology, on the basis of O& M data and communication networks. Such independent monitoring systems need a complete and ripe system architecture to meet the increasing requirement of high quality O& M Research and applications of the key technology for intelligent O& M system architecture are well studied and successfully applied to different condition monitoring and control systems. An intelligent O& M system for TPC is integrated with operation parameters, external environmental conditions, emergency processing data, etc. Comprehensive information of TPC is completely obtained and effectively controlled, which ensured the security and reliability of power cables. With the introduction and application of data integration and mining for multi-dimension condition, an intelligent O& M system architecture for TPC is established, a standardized data display and control platform is developed, with integrated monitoring and control visualization and assistant decision-making functions. In practice, data analysis and intelligent management level of electric utility are Significantly improved.","PeriodicalId":302563,"journal":{"name":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126840660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SDKSE:A Secure Dynamic Keyword Searchable Encryption Scheme for Email Systems SDKSE:电子邮件系统的安全动态关键字可搜索加密方案
Hongyuan Chen, Z. Cao, Xiaolei Dong, Jiachen Shen
{"title":"SDKSE:A Secure Dynamic Keyword Searchable Encryption Scheme for Email Systems","authors":"Hongyuan Chen, Z. Cao, Xiaolei Dong, Jiachen Shen","doi":"10.1109/SSIC.2018.8556786","DOIUrl":"https://doi.org/10.1109/SSIC.2018.8556786","url":null,"abstract":"Cloud computing has an significant impact on both academia and industry with its rapid development. by moving expensive operations like search to cloud, we are able to carry out complicated tasks efficiently. At the same time, cloud security has become a major concern. Malicious clouds are likely to sell privacy information for extra benefit. In order to protect privacy, data are encrypted before being uploaded to cloud. So how to handle encrypted data becomes a new challenge. In this paper we propose SDKSE: a secure dynamic keyword searchable encryption scheme for email systems under cloud computing environment. It is able to update files and keywords at any time. The indexes and the trapdoors generated in the scheme are constant size. In addition, we prove that it is adaptively Trapdoor-IND-CKA and Index-IND-CKA in the standard model.","PeriodicalId":302563,"journal":{"name":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123030049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fully Secure Traceable and Revocable-Storage Attribute-Based Encryption with Short Update Keys via Subset Difference Method 基于子集差分法的基于短更新密钥的完全安全的可跟踪和可撤销存储属性加密
Huijie Lian, Guangbo Wang, Qingxian Wang
{"title":"Fully Secure Traceable and Revocable-Storage Attribute-Based Encryption with Short Update Keys via Subset Difference Method","authors":"Huijie Lian, Guangbo Wang, Qingxian Wang","doi":"10.1109/SSIC.2018.8556734","DOIUrl":"https://doi.org/10.1109/SSIC.2018.8556734","url":null,"abstract":"In order to achieve access control in cloud storage, we consider making use of attribute-based encryption (AUE) which has many excellent properties and can achieve fine-grained access control. Revocable-storage AUE (RS-AUE) is an extension of revocable ABE (R-ABE) which supports not only the revocation functionality but also the ciphertext update functionality. But nearly all known RS-AUE schemes used the complete subtree (CS) method for key revocation which would result in long update keys. In this paper, we construct a comprehensive traceable and revocable-storage AUE (TRS-ABE) scheme with the properties of traceability and revocation simultaneously with full security. In addition, we propose a novel technique to use the subset difference (SD) method instead of the CS method for our TRS- AUE scheme to efficiently reduce the size of update keys based on the recent work of Lee, Choi, Lee, Park, and Yung (Asiacrypt 2013) who firstly introduced a new cryptographic primitive called self-updatable encryption (SUE) which realized a time-updating mechanism. At last, we give its overview proof of full security in the standard model under three static assumptions.","PeriodicalId":302563,"journal":{"name":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116710838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Modeling towards Interrupt System of Virtualized Cryptography Device 虚拟加密设备中断系统的性能建模
Lei Sun, Shuai Li, Songhui Guo, Yingxin Xu
{"title":"Performance Modeling towards Interrupt System of Virtualized Cryptography Device","authors":"Lei Sun, Shuai Li, Songhui Guo, Yingxin Xu","doi":"10.1109/SSIC.2018.8556713","DOIUrl":"https://doi.org/10.1109/SSIC.2018.8556713","url":null,"abstract":"For the problem that the large number of interrupts leads to decrease of the performance of the single-root I/O virtualization cryptography device, we establish an M/M/1 queueing model with preemption priority based on the queuing theory towards interrupt system of virtualized cryptography device. Specifically, we simplify the model taking the average value of interrupt request interval. We find that the long interrupt transmission time and the large interrupt request frequency are the main factors which lower the performance of interrupt system of virtualized cryptography device. In particular, we verify the effectiveness of the model and the correctness of the conclusion by MATLAB simulation and experimental testing. The results show that we can get the system performance index through analyzing the model quantitatively. What’s more, this model helps guide the optimization of interrupt system of virtualized cryptography device.","PeriodicalId":302563,"journal":{"name":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115601516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing Industrial Control System Attack Datasets for Intrusion Detection 用于入侵检测的工业控制系统攻击数据集评估
Xuelei Wang, Ernest Foo
{"title":"Assessing Industrial Control System Attack Datasets for Intrusion Detection","authors":"Xuelei Wang, Ernest Foo","doi":"10.1109/SSIC.2018.8556706","DOIUrl":"https://doi.org/10.1109/SSIC.2018.8556706","url":null,"abstract":"With the rapid development of networks and computers, industrial control systems (ICS) have become more interconnected. Many ICS are allowed remote interactions through the Internet. This increases the security risks of being attacked. If critical infrastructure ICS are attacked, the consequences could be catastrophic. To protect the ICS, the anomaly-based network intrusion detection systems (ABNIDS) are used to detect novel cyber-attacks by learning both normal and abnormal network behaviours. The quality of the attack dataset directly influences the accuracy of the ABNIDS. Therefore, it is important to assess the quality of the attack datasets used to design and develop ABNIDS. To fulfil this goal, this paper provides assessment criteria for evaluating ICS attack datasets. These new assessment criteria demonstrate the various requirements of the dataset and analyse the effectiveness of the dataset in depth. Three existing ICS attack datasets for the DNP3, S7comm and Modbus protocols are assessed using these criteria. We find that there is a range of dataset creation techniques and levels of quality with no dataset that meets the ideal criteria. Since no existing work discusses assessment criteria for ICS attack datasets, this paper would be helpful to evaluate and improve the ICS attack datasets.","PeriodicalId":302563,"journal":{"name":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132064294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信