Proceedings of the 2019 9th International Conference on Communication and Network Security最新文献

筛选
英文 中文
Fault-injection Attack and Improvement of a CRT-RSA Exponentiation Algorithm 错误注入攻击及一种CRT-RSA幂算法的改进
Fanyu Kong, Guoqiang Yang, Huiyi Liu, Y. Jiang, Chengyu Hu, Dashui Zhou
{"title":"Fault-injection Attack and Improvement of a CRT-RSA Exponentiation Algorithm","authors":"Fanyu Kong, Guoqiang Yang, Huiyi Liu, Y. Jiang, Chengyu Hu, Dashui Zhou","doi":"10.1145/3371676.3371699","DOIUrl":"https://doi.org/10.1145/3371676.3371699","url":null,"abstract":"RSA cryptosystem is a widely-used public-key cryptographic algorithm in TLS/SSL and IPSec protocols. Fault-injection attack has a powerful threat on the CRT-based implementation of RSA cryptosystem. In 2016, Y. Choi et al. proposed a new right-to-left square-always exponentiation algorithm and a test-based CRT-RSA exponentiation algorithm to defeat the fault-injection attack. In this paper, we propose a fault-injection attack on Y. Choi et al.'s test-based CRT-RSA exponentiation algorithm. By inducing a permanent fault in the computation process of CRT-RSA cryptosystem, the attacker can obtain a faulty RSA signature and then recover the RSA private key. Furthermore, we give an improved CRT-RSA exponentiation algorithm to fix the security flaw. The security analysis shows that the improved algorithm can resist the fault-injection attack.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131609542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android Malware Detection Combined with Static and Dynamic Analysis 结合静态和动态分析的Android恶意软件检测
Jianing Zhang, Xingtao Zhuang, Yunfang Chen
{"title":"Android Malware Detection Combined with Static and Dynamic Analysis","authors":"Jianing Zhang, Xingtao Zhuang, Yunfang Chen","doi":"10.1145/3371676.3371685","DOIUrl":"https://doi.org/10.1145/3371676.3371685","url":null,"abstract":"Android System has attracted not only constantly increasing number of smart device users, but also the serious attacks from explosive malicious apps. Consequently, the need to effectively detect Android malware is becoming more and more urgent. In the paper, combing the advantages of static analysis and dynamic analysis, we propose an Android malware detection method based on machine classification. Our experimental results show that the accuracy of the approach meets the requirements of Android malware detection. Subsequently, we apply this approach to perform an interesting detection on the popular apps of different user crowds, and provide some corresponding security advices.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116111740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Attack Intent Analysis Method Based on Attack Path Graph 基于攻击路径图的攻击意图分析方法
Biqiong Chen, Yanhua Liu, Shijin Li, Xiaoling Gao
{"title":"Attack Intent Analysis Method Based on Attack Path Graph","authors":"Biqiong Chen, Yanhua Liu, Shijin Li, Xiaoling Gao","doi":"10.1145/3371676.3371680","DOIUrl":"https://doi.org/10.1145/3371676.3371680","url":null,"abstract":"With the rapid development of network technology, network security problems are gradually increasing, and the network attack situation is very severe. In a complex attack scenario, timely detection of potential attack behaviors and timely identification and pre-judgment of attack intentions are important components of security risks. However, the attack behavior in the network presents complexity, multi-step and uncertainty, which brings new technical challenges to attack intent analysis. Aiming at the problem that the attack intention of multi-step complex attack is difficult to identify, this paper proposes an attack intention analysis method based on attack path graph. Firstly, aiming at the multi-step complex attack behavior analysis problem, the key asset assessment technology is used to find out the key assets in the network system, and the hypothetical attack intention is generated according to the security protection requirements of the network system. Then, it is difficult to manually construct the attack path map in the large-scale network, and the automatic generation of the attack path map is realized. Finally, a method of network attack intent identification is proposed and a calculation method of attack intent probability is designed, which improves the efficiency and accuracy of attack intent recognition.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123724335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SSL Malicious Traffic Detection Based On Multi-view Features 基于多视图特征的SSL恶意流量检测
Rui Dai, Chuan Gao, Bo Lang, Lixia Yang, Hongyu Liu, Shaojie Chen
{"title":"SSL Malicious Traffic Detection Based On Multi-view Features","authors":"Rui Dai, Chuan Gao, Bo Lang, Lixia Yang, Hongyu Liu, Shaojie Chen","doi":"10.1145/3371676.3371697","DOIUrl":"https://doi.org/10.1145/3371676.3371697","url":null,"abstract":"In recent years, as more and more softwares use SSL encryption protocol to improve the security and integrity of communications, the encrypted traffic is growing, which brings new challenges to cyber attack detection. Since most of the SSL traffic is unreadable ciphertext, traditional pattern recognition and deep packet inspection are not applicable. In addition, the current machine learning methods are not fully applicable to encrypted traffic detection. The detection of encrypted malicious traffic is still an open problem. In this paper, we propose an SSL malicious traffic detection method based on multi-view features. Our method comprehensively extracts features from multiple views, including flow statistics, SSL handshake field, and certificate to retain key original information. We test four machine learning models, i.e., SVM, Decision Tree, Random Forest, and XGBoost on the CTU Malware dataset. The results show that XGBoost performs best reaching an accuracy of 97.71%, which is better than other studies on the CTU dataset.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"34 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123349997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Semantic-based Malware Behavior Description: Past and Future 基于语义的恶意软件行为描述:过去和未来
Ping Yang, Hui Shu, Xiaobing Xiong, Fei Kang
{"title":"Semantic-based Malware Behavior Description: Past and Future","authors":"Ping Yang, Hui Shu, Xiaobing Xiong, Fei Kang","doi":"10.1145/3371676.3371700","DOIUrl":"https://doi.org/10.1145/3371676.3371700","url":null,"abstract":"Traditional malware detection is faced with problems of low efficiency and high cost. In recent years, in order to improve the efficiency and accuracy of malware detection, a method based on semantic malware behavior description has been widely studied. In this paper, we firstly classified the current methods of semantic-based malware behavior description by their evolution and characteristics. Secondly, we performed a statistical analysis for the typical description in different aspects. Finally, through statistical analysis, we revealed the challenges faced by semantic-based malware behavior description and its future development prospects.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127594283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Power Allocation Based on Geometric Programming for Non-orthogonal Multiple Access Heterogeneous Networks 基于几何规划的非正交多址异构网络功率分配
Xin Song, Xuefeng Huang, Haijun Qian
{"title":"Power Allocation Based on Geometric Programming for Non-orthogonal Multiple Access Heterogeneous Networks","authors":"Xin Song, Xuefeng Huang, Haijun Qian","doi":"10.1145/3371676.3371687","DOIUrl":"https://doi.org/10.1145/3371676.3371687","url":null,"abstract":"In practical situations, the performance of some power allocation schemes degrades sufficiently with imperfect channel state information (CSI). To account for the problem, we propose a novel power allocation scheme in Non-orthogonal multiple access (NOMA) heterogeneous networks based on imperfect CSI, which achieve optimal sum data rate while optimizing power allocation. It is proved that the optimization problem is non-convex with the constraint of outage probability limit. We first transform the probabilistic mixed problem into a non-probabilistic problem, which is solved based on geometric programming (GP), and then the power allocation for each small cell user is achieved via Lagrange dual method. The simulation results show that the proposed algorithm can significantly improve the output performance compared with equal-power allocation (EPA) algorithm.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"28 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120931206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless Signal Identification in 230MHz Band Based on Interference Cleaning and Convolutional Neural Network 基于干扰清洗和卷积神经网络的230MHz频段无线信号识别
Yucheng Wang, Daohua Zhu, Qing Wu, Yajuan Guo, Chonghai Yang, Wenjiang Feng
{"title":"Wireless Signal Identification in 230MHz Band Based on Interference Cleaning and Convolutional Neural Network","authors":"Yucheng Wang, Daohua Zhu, Qing Wu, Yajuan Guo, Chonghai Yang, Wenjiang Feng","doi":"10.1145/3371676.3371686","DOIUrl":"https://doi.org/10.1145/3371676.3371686","url":null,"abstract":"With the development of digital wireless communication technol-ogy, the wireless signal identification has been suffering from increasingly complex electromagnetic environment and higher spectrum utilization. In this paper, we propose a wireless signal identification method based on interference cleaning and convolutional neural network (CNN) in 230MHz Band. The method firstly analyzes the received signal in time domain, building feature data sets combined with amplitudes, phases, in-phase components and orthogonal components. The method then generalizes singular value decomposition(SVD) and subspace division to preserve signal subspace, eliminate noise subspace and interference compress subspace. Finally, it utilizes the data set to train the CNN and make the wireless signals' identification through the well-trained the CNN. The experimental results with different kinds of modulation show that this method can achieve high recognition accuracy and strong anti-noise ability.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116421735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mitigating Flow Table Overloading Attack with Controller-based Flow Filtering Strategy in SDN 基于控制器的SDN流过滤策略缓解流表过载攻击
Phan The Duy, Hoai An Le Thi, V. Pham
{"title":"Mitigating Flow Table Overloading Attack with Controller-based Flow Filtering Strategy in SDN","authors":"Phan The Duy, Hoai An Le Thi, V. Pham","doi":"10.1145/3371676.3371706","DOIUrl":"https://doi.org/10.1145/3371676.3371706","url":null,"abstract":"Controller is a key component in the three layers of Software - Defined Networking (SDN), which is to process a huge number of flow requests from network devices. As a result, it puts a flow rule into flow table in switch according to every incoming packet. However, the capacity of flow table is limited and can be the target of malicious attacks by taking advantage of installing rules from controller. Specifically, malicious rules can be pushed from controller to occupy the available space for new benign traffic due to controlling and directing the packets in SDN relied on flow rules installation. These tables can be full of a massive number of flow entries populated from controller, leading to be out of space for new benign flows. This paper gives a method to mitigate flow table overloading attack after a DDoS attack notification. It can help the data plane to be more secured by improving the availability of flow table with a strategy of real-time packet monitoring and flow management in controller.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120861428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Polynomial Time Algorithm for Scheduling on Processing Time Constraints 加工时间约束下调度的多项式时间算法
Xuerong Yue, Jiji Gao, Zhibin Chen
{"title":"A Polynomial Time Algorithm for Scheduling on Processing Time Constraints","authors":"Xuerong Yue, Jiji Gao, Zhibin Chen","doi":"10.1145/3371676.3371690","DOIUrl":"https://doi.org/10.1145/3371676.3371690","url":null,"abstract":"Given m parallel machines and n jobs with each job having a processing time, the classical scheduling, a famous NP-hard problem, wants to find a way to schedule all jobs on m machines such that the makespan is minimized. In this paper, we consider polynomial time solvability of this problem in some cases when certain conditions on processing times are being imposed. We focus on the case in which the processing times are powers of 2. We design a polynomial-time algorithm that solves this special case. Our result can be generalized to the case when processing times satisfy divisible property.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133408191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Automatic Testing Platform for Object-oriented Software based on Code Coverage 基于代码覆盖率的面向对象软件自动测试平台
Bo Liu, Honghe Ge, Jinfu Chen, Qihao Bao
{"title":"An Automatic Testing Platform for Object-oriented Software based on Code Coverage","authors":"Bo Liu, Honghe Ge, Jinfu Chen, Qihao Bao","doi":"10.1145/3371676.3371702","DOIUrl":"https://doi.org/10.1145/3371676.3371702","url":null,"abstract":"The development of automatic object-oriented software testing tools is a challenging and realistic subject in the field of software engineering. A testing prototype system named ARTCovPS (Adaptive Random Testing Coverage-based testing Prototype System) is designed and implemented for the widely used object-oriented method software. ARTCovPS mainly performs automated testing from two aspects, dynamic test case generation of object-oriented software based on coverage and adaptive random testing method based on coverage. To a certain extent, ARTCovPS testing prototype system realizes the software test automation, and the system has a high running efficiency and can automatically run different comparison methods. The experimental results are satisfactory, and the feasibility of the system is also verified.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121999899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信