European Workshop on System Security最新文献

筛选
英文 中文
Logging based IP Traceback in switched ethernets 交换以太网中基于日志的IP回溯
European Workshop on System Security Pub Date : 2008-03-31 DOI: 10.1145/1355284.1355286
M. Andreou, A. Moorsel
{"title":"Logging based IP Traceback in switched ethernets","authors":"M. Andreou, A. Moorsel","doi":"10.1145/1355284.1355286","DOIUrl":"https://doi.org/10.1145/1355284.1355286","url":null,"abstract":"IP Traceback systems facilitate tracing of IP packets back to their origin, despite possibly forged or overwritten source address data. A common shortcoming of existing proposals is that they identify source network, but not the source host. Our work extends the traceback process to allow tracing of (switched) Ethernet frames. We build on SPIE (which operates at IP routers) to design and implement 'switch-SPIE'. Traffic logging is deployed in a 'switch-DGA' tap-box at each switch. The (switched) Ethernet traffic visibility issue is resolved with port mirroring, and the MAC address table establishes causality between source MAC address and source switch port. Our solution works for any network topology, as opposed to earlier layer 2 extensions to IP Traceback. We provide an implementation and experimental evaluation to establish the efficacy of our approach, with respect to processing overhead and memory use.","PeriodicalId":302603,"journal":{"name":"European Workshop on System Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130226975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
SC@CCO: a Graphic-Based Authentication System SC@CCO:基于图形的认证系统
European Workshop on System Security Pub Date : 2008-03-31 DOI: 10.1145/1355284.1355287
Rosalia D'Alessandro, M. Ghirardi, M. Leone
{"title":"SC@CCO: a Graphic-Based Authentication System","authors":"Rosalia D'Alessandro, M. Ghirardi, M. Leone","doi":"10.1145/1355284.1355287","DOIUrl":"https://doi.org/10.1145/1355284.1355287","url":null,"abstract":"At the present time, phishing attacks are more and more sophisticated and they continue to be an issue, especially for financial institutes. The most common defense mechanisms used today are effective if the phishing attack is passive, while completely useless in the case of active phishing attacks. To face both threats, we propose SC@CCO, an innovative system combining the security of challenge-response and two factor authentication mechanisms. SC@CCO uses an untrustworthy terminal, such as a shared computer, and an insecure channel, such as the Internet, to carry a graphic challenge from which a trusted mobile terminal computes the expected authentication response. The latter is shown to the user and subsequently submitted to the server, along with a personal identification number, in order to complete the authentication. The graphic challenge is obtained by encoding a challenge into a bi-dimensional barcode image. The trusted mobile terminal of the user must be equipped with a common digital camera and an appropriate client application. In the present approach, the personal mobile device plays the role of a security token able to authenticate, on one hand, who is issuing a transaction, and, on the other hand, the transaction data, with the advantage that the user does not have to install devices and/or software on an untrustworthy computer.","PeriodicalId":302603,"journal":{"name":"European Workshop on System Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129863358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信