2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)最新文献

筛选
英文 中文
Analysis of Network Threats Based on Data from Server-Traps 基于服务器trap数据的网络威胁分析
E. Sagatov, D. A. Shkirdov, A. Sukhov
{"title":"Analysis of Network Threats Based on Data from Server-Traps","authors":"E. Sagatov, D. A. Shkirdov, A. Sukhov","doi":"10.1109/NTMS.2019.8763847","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763847","url":null,"abstract":"The paper presents the results of data analysis from a geographically distributed network of honeypot servers. A network of 4 honeypot servers was deployed more than two years ago. Analysis of the collected data has allowed us to build a network intrusion model. This model includes blacklists of attacking addresses for various internet services, statistics on the intensity of everyday intrusion attempts and an analysis of attacking addresses as belonging to providers of various countries. Special mention should be made of the ranked lists of major vulnerabilities that attackers use to attempt to break content management systems.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127327685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Interoperability for Cooperative ITS: Architecture and Validation 协同ITS的安全互操作性:体系结构和验证
M. Msahli, H. Labiod, Gilles Ampt
{"title":"Security Interoperability for Cooperative ITS: Architecture and Validation","authors":"M. Msahli, H. Labiod, Gilles Ampt","doi":"10.1109/NTMS.2019.8763819","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763819","url":null,"abstract":"Plenty of technologies have been deployed to evolve and manage Transport Systems. But recently academia and industry efforts are concentrated on road safety via Intelligent Transportation Systems (ITS). Undeniably, as vehicular computing systems become interconnected, there will be a good target for malicious attacks by exploiting system vulnerabilities. In this context, we define the InterCor project. The purpose of this project is to improve and to enhance transportation safety and efficiency specially in case of interoperability between several C-ITS systems. We consider in this project that security and privacy are the central pieces of ITS system requirements. In fact, it is a versatile project that trying to resolve multiple challenges in term of security interoperability without divulging vehicle privacy. In this work we describe interoperability trust model used in InterCor project and tested security scenarios. We provide also some results of these tests.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"522 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116572362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detecting Intrusive Behaviour of People in a Building through Data Analysis and Anomaly Detection in Home Automation Systems 通过家庭自动化系统中的数据分析和异常检测来检测建筑物中人员的侵入行为
T. Mundt, Simeon Wiedenmann, Johannes Goltz, Johann Bauer, Maximilian Jung
{"title":"Detecting Intrusive Behaviour of People in a Building through Data Analysis and Anomaly Detection in Home Automation Systems","authors":"T. Mundt, Simeon Wiedenmann, Johannes Goltz, Johann Bauer, Maximilian Jung","doi":"10.1109/NTMS.2019.8763844","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763844","url":null,"abstract":"Building automation systems provide a lot of data about the current condition of houses. For this purpose, a large number of sensors are usually installed in the building. Such sensors are for example motion detectors and light switches. The sensors detect human actions. They are connected to a network, in our case via a fieldbus network, namely KNX. This makes it possible to evaluate the events at a central location. In this paper we show how data from building automation can be used to detect physical intruders and other \"anomalies\" such as unusual human movements. We present how we collected data about the physical location of the sensors and data representing events. We also show what procedures and algorithms we have used to detect anomalies.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127603282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Survey of Formal Verification Methods for Smart Contracts on Blockchain 区块链智能合约形式化验证方法研究
Yvonne Murray, D. A. Anisi
{"title":"Survey of Formal Verification Methods for Smart Contracts on Blockchain","authors":"Yvonne Murray, D. A. Anisi","doi":"10.1109/NTMS.2019.8763832","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763832","url":null,"abstract":"Due to the immutable nature of distributed ledger technology such as blockchain, it is of utter importance that a smart contract works as intended before employment outside test network. This is since any bugs or errors will become permanent once published to the live network, and could lead to substantial economic losses; as manifested in the infamous DAO smart contract exploit hack in 2016. In order to avoid this, formal verification methods can be used to ensure that the contract behaves according to given specifications. This paper presents a survey of the state of the art of formal verification of smart contracts. Being a relatively new research area, a standard or best practice for formal verification of smart contracts has not yet been established. Thus, several different methods and approaches have been used to perform the formal verification. The survey presented in this paper shows that some variant of model checking or theorem proving methodology seems to be most successful. However, as of today, formal verification is only successful on simple contracts, and does not support more advanced smart contract syntax.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131151616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Secure Data Sharing with Fast Access Revocation through Untrusted Clouds 通过不可信云实现快速访问撤销的安全数据共享
K. Kapusta, Han Qiu, G. Memmi
{"title":"Secure Data Sharing with Fast Access Revocation through Untrusted Clouds","authors":"K. Kapusta, Han Qiu, G. Memmi","doi":"10.1109/NTMS.2019.8763850","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763850","url":null,"abstract":"With the introduction of recent regulations concerning data privacy, encrypting data before uploading it to a public cloud becomes a widespread approach. Such processing reinforces data confidentiality but raises a challenge for efficient access revocation. In this paper, we introduce a conceptual multi-cloud architecture supporting a fast access revocation of outsourced data. The proposed data processing method is based on a combination of encryption, all-or-nothing transformation, and data dispersal. Theoretical and experimental evaluations show that our technique is the fastest among the state-of-the- art solutions.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125019382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Evaluation of FTTx Access Network Migration for IPTV Services 面向IPTV业务的FTTx接入网迁移评估
Yekta Turk, E. Zeydan
{"title":"Evaluation of FTTx Access Network Migration for IPTV Services","authors":"Yekta Turk, E. Zeydan","doi":"10.1109/NTMS.2019.8763855","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763855","url":null,"abstract":"Fixed network operators (FNOs) are seeking to upgrade their existing infrastructure with better investment strategies. For this reason, migration of the existing technologies into new and high income generating technologies is of paramount importance for FNOs. However, even though the end-users have the infrastructure support to receive better services such as HD IPTV, FNOs are not willing to upgrade the status of their existing services to end-users most of the time due to possibility of service disruptions. In this paper, we study a case study and propose Fiber-to-the-X (FTTX) migration strategy where subscribers with ADSL2+ connectivity can be migrated to VDSL2 technology via the proposed methodology that analyzes the real operator data and acts based on the proposed criteria. After proposed mitigation study, HD IPTV services have been successfully offered to end-users that have the potential to have upgraded services due to their infrastructure capabilities.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124995508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Network Model for Cyber Threat Intelligence Sharing using Blockchain Technology 基于区块链技术的网络威胁情报共享新模型
Daire Homan, Ian Shiel, Christina Thorpe
{"title":"A New Network Model for Cyber Threat Intelligence Sharing using Blockchain Technology","authors":"Daire Homan, Ian Shiel, Christina Thorpe","doi":"10.1109/NTMS.2019.8763853","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763853","url":null,"abstract":"The aim of this research is to propose a new blockchain network model that facilitates the secure dissemination of Cyber Threat Intelligence (CTI) data. The primary motivations for this study are based around the recent changes to information security legislation in the European Union and the challenges that Computer Security and Incident Response Teams (CSIRT) face when trying to share actionable and highly sensitive data within systems where participants do not always share the same interests or motivations. We discuss the common problems within the domain of CTI sharing and we propose a new model, that leverages the security properties of blockchain. Our model provides a more effective and efficient framework for a CTI sharing network that has the potential to overcome the trust barriers and data privacy issues inherent in this domain. We implemented a testbed using Hyperledger Fabric and the STIX 2.0 protocol and validated the efficacy of the segmentation, implemented using smart contracts and Fabric channels.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130267103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Collateral Use of Deployment Code for Smart Contracts in Ethereum 以太坊智能合约部署代码的附带使用
Monika Di Angelo, G. Salzer
{"title":"Collateral Use of Deployment Code for Smart Contracts in Ethereum","authors":"Monika Di Angelo, G. Salzer","doi":"10.1109/NTMS.2019.8763828","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763828","url":null,"abstract":"Ethereum is still the most prominent platform for smart contracts. For the deployment of contracts on its blockchain, the so-called deployment code is executed by Ethereum's virtual machine. As it turns out, deployment code can do a lot more than merely deploying a contract. This paper identifies less-anticipated uses of contract deployment in Ethereum by analyzing the available blockchain data. In particular, we analyze the specifics of deployment code used beyond actually deploying a contract in a quantitative and qualitative manner. To this end, we identify code patterns in deployment code by distilling recurring code skeletons from all external transactions and internal messages that contain deployment code. Tracking the use of these patterns reveals a set of vulnerabilities in contracts targeted by skillfully crafted deployment code. We summarize the encountered exploitative cases of collateral use of deployment code and report respective quantities. Example scenarios illustrate the recent usage. Collateral use of deployment code starts to appear in the middle of 2018 and becomes dominant among contract creations in autumn of 2018. We intend to raise awareness about the less obvious uses of deployment code and its potential security issues.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130740762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Monitoring Leaked Confidential Data 监控泄露的机密数据
S. Trabelsi
{"title":"Monitoring Leaked Confidential Data","authors":"S. Trabelsi","doi":"10.1109/NTMS.2019.8763811","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763811","url":null,"abstract":"During the first half of 2018 over than 945 data breaches resulted in 4.5 Billion data records been compromised worldwide. Data leak is one of the biggest security issues targeting the industrial and governmental sectors. The data loss hemorrhage is too important and uncontrollable that companies and institutions need to react very quickly to reduce the risk of being targeted by an attack exploiting leaked data. Unfortunately, this in not yet the case, because on average a company spend 196 days to identify a data breach and 69 additional days to contain it. In order to reduce the identifications time, we propose a solution to monitor, in real time, huge streams of leaked data published on hacking sources. These ese data are classified, and confidential information is precisely identified. This classification is per-formed by the combination of inference rules and a Convolutional Neural Network pre-trained model, which recognizes different patterns of confidential data. We also describe our observations from the data that we collected and identified in the context of a company monitoring use case.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115018743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Attribute-Based Access Control using Chaincode in RFID Systems RFID系统中基于属性的链码访问控制
Santiago Figueroa, J. Añorga, S. Arrizabalaga, Iñigo Irigoyen, Mario Monterde
{"title":"An Attribute-Based Access Control using Chaincode in RFID Systems","authors":"Santiago Figueroa, J. Añorga, S. Arrizabalaga, Iñigo Irigoyen, Mario Monterde","doi":"10.1109/NTMS.2019.8763824","DOIUrl":"https://doi.org/10.1109/NTMS.2019.8763824","url":null,"abstract":"Ideal RFID systems used in product lifecycle should satisfy high confidentiality, anonymity, integrity and high availability. However, collection and distribution of RFID data are subject to various security concerns. RFID middleware systems are likely to suffer from parameter manipulation and eavesdropping, raising privacy concerns. Most recent works focus on access control schemes with models based on Attribute-Based Access Control (ABAC). These schemes, to enhance the security and privacy, are based on centralized models. In this paper, we present an ABAC model using chaincode in RFID systems. Our ABAC system is based on Hyperledger Fabric Blockchain, which is a modular and extensible open-source system for deploying and operating permissioned blockchains. Our ABAC model uses smart contracts and blockchain technology as versatile infrastructures to represent the trust and endorsement relationship that are essential in the ABAC model in order to ensure the security of RFID systems. It should also be noted that the RFID system presented is based on the EPCGlobal standard.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131201866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信