EAI Endorsed Trans. Security Safety最新文献

筛选
英文 中文
A Deep Learning Approach for Network Intrusion Detection System 一种网络入侵检测系统的深度学习方法
EAI Endorsed Trans. Security Safety Pub Date : 2016-05-24 DOI: 10.4108/eai.3-12-2015.2262516
A. Javaid, Quamar Niyaz, Weiqing Sun, Mansoor Alam
{"title":"A Deep Learning Approach for Network Intrusion Detection System","authors":"A. Javaid, Quamar Niyaz, Weiqing Sun, Mansoor Alam","doi":"10.4108/eai.3-12-2015.2262516","DOIUrl":"https://doi.org/10.4108/eai.3-12-2015.2262516","url":null,"abstract":"A Network Intrusion Detection System (NIDS) helps system administrators to detect network security breaches in \u0000 \u0000their organizations. However, many challenges arise while \u0000 \u0000developing a flexible and efficient NIDS for unforeseen and unpredictable attacks. We propose a deep learning based approach for developing such an efficient and flexible NIDS. \u0000 \u0000We use Self-taught Learning (STL), a deep learning based technique, on NSL-KDD - a benchmark dataset for network \u0000 \u0000intrusion. We present the performance of our approach and compare it with a few previous work. Compared metrics include accuracy, precision, recall, and f-measure values.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132978952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 848
Identity Deception and Game Deterrence via Signaling Games 基于信号博弈的身份欺骗与博弈威慑
EAI Endorsed Trans. Security Safety Pub Date : 2016-05-24 DOI: 10.4108/eai.3-12-2015.2262519
W. Casey, Parisa Memarmoshrefi, Ansgar Kellner, J. Morales, B. Mishra
{"title":"Identity Deception and Game Deterrence via Signaling Games","authors":"W. Casey, Parisa Memarmoshrefi, Ansgar Kellner, J. Morales, B. Mishra","doi":"10.4108/eai.3-12-2015.2262519","DOIUrl":"https://doi.org/10.4108/eai.3-12-2015.2262519","url":null,"abstract":"Maintenance and verication of persistent identities is an \u0000 \u0000important problem in the area of networking. Particularly, \u0000 \u0000their critical roles in Wireless Ad-hoc networks (WANETs) \u0000 \u0000have become even more prominent as they begin to be deployed \u0000 \u0000in several application domains. In these contexts, \u0000 \u0000Sybil attacks, making use of replicated deceptive identities, \u0000 \u0000represent a major challenge for the designers of these networks. \u0000 \u0000Inspired by biological models of ant colonies and \u0000 \u0000their dynamics studied via information asymmetric signaling \u0000 \u0000games, we propose an architecture that can withstand Sybil \u0000 \u0000attacks, similar to ants, using complex chemical signaling \u0000 \u0000systems and associated physical actions, naturally `authenticate' \u0000 \u0000colony members. Here, we present a biomimetic authentication \u0000 \u0000protocol with mechanisms similar to the physical \u0000 \u0000processes of chemical diusion, and formalize approaches \u0000 \u0000to tame the deceptive use of identities; we dub the resulting \u0000 \u0000game anidentity management signaling game\". To consider \u0000 \u0000network system of nodes, pursuing non-cooperative and deceptive \u0000 \u0000strategies, we develop an evolutionary game system \u0000 \u0000allowing cooperative nodes to mutate deceptive strategies. \u0000 \u0000We empirically study the dynamics using simulation experiments \u0000 \u0000to select the parameters which aect the overall behaviors. \u0000 \u0000Through experimentation we consider how an in- \u0000 \u0000centive package in the form of a shared database can impact \u0000 \u0000system behavior.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126165615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Proposing Multimodal Integration Model Using LSTM and Autoencoder 利用LSTM和自编码器提出多模态集成模型
EAI Endorsed Trans. Security Safety Pub Date : 2016-05-24 DOI: 10.4108/eai.3-12-2015.2262505
Wataru Noguchi, H. Iizuka, Masahito Yamamoto
{"title":"Proposing Multimodal Integration Model Using LSTM and Autoencoder","authors":"Wataru Noguchi, H. Iizuka, Masahito Yamamoto","doi":"10.4108/eai.3-12-2015.2262505","DOIUrl":"https://doi.org/10.4108/eai.3-12-2015.2262505","url":null,"abstract":"We propose an architecture of neural network that can learn and integrate sequential multimodal information using Long Short Term Memory. Our model consists of encoder and decoder LSTMs and multimodal autoencoder. For integrating sequential multimodal information, firstly, the encoder LSTM encodes a sequential input to a fixed range feature vector for each modality. Secondly, the multimodal autoencoder integrates the feature vectors from each modality and generate a fused feature vector which contains sequential multimodal information in a mixed form. The original feature vectors from each modality are re-generated from the fused feature vector in the multimodal autoencoder. The decoder LSTM decodes the sequential inputs from the regenerated feature vector. Our model is trained with the visual and motion sequences of humans and is tested by recall tasks. The experimental results show that our model can learn and remember the sequential multimodal inputs and decrease the ambiguity generated at the learning stage of LSTMs using integrated multimodal information. Our model can also recall the visual sequences from the only motion sequences and vice versa.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127109714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Investigating the Learning Phase of an Autonomous Authentication in Mobile Ad-hoc Networks 移动Ad-hoc网络中自主认证学习阶段的研究
EAI Endorsed Trans. Security Safety Pub Date : 2016-05-24 DOI: 10.4108/eai.3-12-2015.2262465
Han Zhang, Parisa Memarmoshrefi, Fatemeh Ashrafi, D. Hogrefe
{"title":"Investigating the Learning Phase of an Autonomous Authentication in Mobile Ad-hoc Networks","authors":"Han Zhang, Parisa Memarmoshrefi, Fatemeh Ashrafi, D. Hogrefe","doi":"10.4108/eai.3-12-2015.2262465","DOIUrl":"https://doi.org/10.4108/eai.3-12-2015.2262465","url":null,"abstract":"In this work we focus on investigating the learning phase of an autonomous authentication mechanism. Through a series of \u0000 \u0000simulation, an experimental best cutoff point and the aggression \u0000 \u0000threshold values for different network size were calculated. In the test phase, those found values are proved by the average good accuracy.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126910916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of Cryptography Usage in Android Applications Android应用程序中加密使用的评估
EAI Endorsed Trans. Security Safety Pub Date : 2016-05-24 DOI: 10.4108/eai.3-12-2015.2262471
Alexia Chatzikonstantinou, Christoforos Ntantogian, Georgios Karopoulos, C. Xenakis
{"title":"Evaluation of Cryptography Usage in Android Applications","authors":"Alexia Chatzikonstantinou, Christoforos Ntantogian, Georgios Karopoulos, C. Xenakis","doi":"10.4108/eai.3-12-2015.2262471","DOIUrl":"https://doi.org/10.4108/eai.3-12-2015.2262471","url":null,"abstract":"Mobile application developers are using cryptography in their products to protect sensitive data like passwords, short messages, documents etc. In this paper, we study whether cryptography and related techniques are employed in a proper way, in order to protect these private data. To this end, we downloaded 49 Android applications from the Google Play marketplace and performed static and dynamic analysis in an attempt to detect possible cryptographic misuses. The results showed that 87.8% of the applications present some kind of misuse, while for the rest of them no cryptography usage was detected during the analysis. Finally, we suggest countermeasures, mainly intended for developers, to alleviate the issues identified by the analysis.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130777155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Evaluating the impact of eDoS attacks to cloud facilities 评估ddos攻击对云设施的影响
EAI Endorsed Trans. Security Safety Pub Date : 2016-01-04 DOI: 10.4108/eai.14-12-2015.2262650
Gian-Luca Dei Rossi, M. Iacono, A. Marin
{"title":"Evaluating the impact of eDoS attacks to cloud facilities","authors":"Gian-Luca Dei Rossi, M. Iacono, A. Marin","doi":"10.4108/eai.14-12-2015.2262650","DOIUrl":"https://doi.org/10.4108/eai.14-12-2015.2262650","url":null,"abstract":"The complexity of modern cloud facilities requires attentive management policies that \u0000 \u0000should encompass all aspects of the system. Security is a critical issue, as intrusions, misuse or denial of service attacks may damage both the users and the cloud provider including its reputation on the market. Disruptive attacks happen fast, cause evident and short term damages and are usually the result of operations that are hard to disguise. On the other hand, Energy oriented Denial of Service (eDoS) attacks aim at producing continuous minor damages, eventually with long term consequences. These long lasting attacks are difficult to detect. In this paper we model and analyse the behaviour of a system under eDoS attack. We study the impact in terms of cloud energy consumption of an attack strategy previously proposed in the literature and compare it with other strategies that we propose. Our findings show that the strategy previously proposed in the literature, based on keeping the cloud close to saturation, is not optimal (from the point of view of the attacker) in presence of non-constant workload and that there is a trade-off between the aggressiveness of the attacker and the duration of the attack in order to maximise the damage.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123257347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Protecting Encryption Keys in Mobile Systems Against Memory Errors 保护移动系统中的加密密钥防止内存错误
EAI Endorsed Trans. Security Safety Pub Date : 2016-01-04 DOI: 10.4108/eai.14-12-2015.2262698
Jianing Zhao, P. Kemper
{"title":"Protecting Encryption Keys in Mobile Systems Against Memory Errors","authors":"Jianing Zhao, P. Kemper","doi":"10.4108/eai.14-12-2015.2262698","DOIUrl":"https://doi.org/10.4108/eai.14-12-2015.2262698","url":null,"abstract":"Beyond its use to encrypt data, an encryption key can be used as a mean to control access to data on a mobile de- vice by leveraging a cloud service. This implies that a key is present in a mobile device only when it is on demand and authorized by the cloud, the key is evicted when it is not in use. CleanOS is an example system that is based on this concept. For security reasons, keys are stored only in DRAM memory during execution, which makes them susceptible to memory errors. In this paper, we identify scenarios where a memory error that damages a key can escalate to an unrecoverable data loss in a mobile system.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"94 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127981715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reliability Analysis with Dynamic Reliability Block Diagrams in the Möbius Modeling Tool 利用Möbius建模工具中的动态可靠性方框图进行可靠性分析
EAI Endorsed Trans. Security Safety Pub Date : 2016-01-04 DOI: 10.4108/eai.14-12-2015.2262723
K. Keefe, W. Sanders
{"title":"Reliability Analysis with Dynamic Reliability Block Diagrams in the Möbius Modeling Tool","authors":"K. Keefe, W. Sanders","doi":"10.4108/eai.14-12-2015.2262723","DOIUrl":"https://doi.org/10.4108/eai.14-12-2015.2262723","url":null,"abstract":"Reliability block diagram (RBD) models are a commonly used reliability analysis method. For static RBD models, combinatorial solution techniques are easy and efficient. However, static RBDs are limited in their ability to express varying system state, dependent events, and non-series-parallel topologies. A recent extension to RBDs, called Dynamic Reliability Block Diagrams (DRBD), has eliminated those limitations. This tool paper details the RBD implementation in the Mobius modeling framework and provides technical details for using RBDs independently or in composition with other Mobius modeling formalisms. The paper explains how the graphical front-end provides a user-friendly interface for specifying RBD models. The back-end implementation that interfaces with the Mobius AFI to dene and generate executable models that the Mobius tool uses to evaluate system metrics is also detailed.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128588505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Safer Interactive Medical Device Design: Insights from the CHI+MED Project 更安全的交互式医疗设备设计:来自CHI+MED项目的见解
EAI Endorsed Trans. Security Safety Pub Date : 2015-12-22 DOI: 10.4108/EAI.14-10-2015.2261752
P. Curzon, A. Blandford, H. Thimbleby, A. Cox
{"title":"Safer Interactive Medical Device Design: Insights from the CHI+MED Project","authors":"P. Curzon, A. Blandford, H. Thimbleby, A. Cox","doi":"10.4108/EAI.14-10-2015.2261752","DOIUrl":"https://doi.org/10.4108/EAI.14-10-2015.2261752","url":null,"abstract":"Interactive medical devices such as infusion pumps, monitors and diagnostic devices help save lives. However, they are also safety critical in that they may fail in use and patient harm or death ensue. It is not just that the software and hardware should meet their specification. The design should help ensure users do not make mistakes. Safety factors become more important as medical devices become mobile and are used by patients as part of their everyday life rather than by trained professionals in well-defined hospital environments. Regulators are increasingly taking home-use seriously as a result of device recalls due to devices that have caused patient harm. We give insights from the research on the CHI+MED project (www.chi-med.ac.uk). It has focussed on understanding how the design of interactive medical devices can support safety. CHI+MED also developed practical tools and guidance that we review.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131569781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits 分离控制和数据栈,以减轻缓冲区溢出漏洞
EAI Endorsed Trans. Security Safety Pub Date : 2015-10-05 DOI: 10.4108/eai.5-10-2015.150477
C. Kugler, Tilo Müller
{"title":"Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits","authors":"C. Kugler, Tilo Müller","doi":"10.4108/eai.5-10-2015.150477","DOIUrl":"https://doi.org/10.4108/eai.5-10-2015.150477","url":null,"abstract":"Despite the fact that protection mechanisms like StackGuard, ASLR and NX are widespread, the development on new defense strategies against stack-based buffer overflows has not yet come to an end. In this article, we present a novel compiler-level protection called SCADS: Separated Control and Data Stacks that protects return addresses and saved frame pointers on a separate stack, called the control stack. In common computer programs, a single user mode stack is used to store control information next to data buffers. By separating control information from the data stack, we can protect sensitive pointers of a program’s control flow from being overwritten by buffer overflows. To substantiate the practicability of our approach, we provide SCADS as an open source patch for the LLVM compiler infrastructure. Focusing on Linux and FreeBSD running on the AMD64 architecture, we show compatibility, security and performance results. As we make control flow information simply unreachable for buffer overflows, many exploits are stopped at an early stage of progression with only negligible performance overhead.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130876255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信