{"title":"Investigating real-time system forensics","authors":"J. Sremack","doi":"10.1109/SECCMW.2005.1588291","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588291","url":null,"abstract":"Forensic investigations of real-time systems should differ from those of traditional systems. Real-time systems are unique in their requirements and specifications, and this uniqueness presents new challenges for forensic investigations. The ubiquity of real-time systems, coupled with their inherent differences, demands that a new, real-time system-specific forensic investigation framework be developed. This paper highlights the importance of real-time systems and the differences from traditional systems with respect to forensic investigations. From that discussion, a basis for conducting real-time system investigations is presented, along with an example scenario.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"347 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133807921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computational complexity of one reputation metric","authors":"V. Grishchenko","doi":"10.1109/SECCMW.2005.1588305","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588305","url":null,"abstract":"This article addresses a problem of practical computation of a previously defined (Grischenko, 2004) reputation metric in P2P (peer-to-peer) environments. This problem turns out to be identical to a very generic all-pairs-shortest-paths problem (APSP) calculated in a distributed environment. An algorithm of practically acceptable computational cost is introduced and analyzed.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122611718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of a self-evolving trust building framework","authors":"G. Marias, V. Tsetsos, O. Sekkas, P. Georgiadis","doi":"10.1109/SECCMW.2005.1588306","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588306","url":null,"abstract":"A self-evolving reputation scheme for trust establishment in distributed peer networks is presented and evaluated. The framework, called ad-hoc trust framework (ATF), incorporates subjective behavior of end-users, direct observations of behaviors, recommendations, and history of evidences to assess the trustworthiness of peer entities. It considers several idiosyncrasies of the wireless self-organized networks, such as lack of computational resources. ATF is associated with a generic model for the evaluation of the trustworthiness of adjacent or distant nodes. It relies on a sophisticated reputation method, called trustspan, to contact only trusted peers for recommendations, and, thus, it minimizes communication costs for trust building, accelerating the trust evolution process. To evaluate the performance of the ATF framework we have deployed a large number of simulation scenarios. The performance assessment results show that ATF achieves to rapidly identify selfish nodes with high accuracy, and with relatively low communication costs.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132137400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling the network forensics behaviors","authors":"Wei Ren, Hai Jin","doi":"10.1109/SECCMW.2005.1588287","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588287","url":null,"abstract":"Network forensics is a new coming approach to the network security. However, this field is not very clear to the new researchers. In this paper, we discuss the network forensics behaviors systematically from both the technical view and legal view. The goal of discussion is to outline the formalization and standardization of the network forensics behaviors. To our knowledge, this is the first time to comprehensively discuss the network forensics model and its fundamental fields, such as taxonomy, conceptual model, legal principles, key techniques, canonical processes and its accessory facilities and systems - network forensics system architecture and deployment. These discussions will give the guidance to the standardization of network forensics processes and the implementation of prototype system.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116774143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A context-aware trust-based security system for ad hoc networks","authors":"Maria Moloney, S. Weber","doi":"10.2139/SSRN.2227592","DOIUrl":"https://doi.org/10.2139/SSRN.2227592","url":null,"abstract":"Mobile ad-hoc networks (MANETs) comprise computer nodes which communicate over wireless links without any central control. Therefore, they must be able to make fully autonomous security decisions. This introduces new security challenges that existing security models and mechanisms do not adequately address (Campbell, 2002). In this paper we present a trust-based security system that deals with the specific challenges of MANETs by combining decentralised security management and context-aware computing. With this combination, our trust-based security system can establish appropriate trust levels for every situation.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125700673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization","authors":"A. Slagell, W. Yurcik","doi":"10.1109/SECCMW.2005.1588299","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588299","url":null,"abstract":"Logs are one of the most fundamental resources to any security professional. It is widely recognized by the government and industry that it is both beneficial and desirable to share logs for the purpose of security research. However, the sharing is not happening or not to the degree or magnitude that is desired. Organizations are reluctant to share logs because of the risk from exposing sensitive information to potential attackers. In this paper we survey current attempts at sharing logs and current log anonymization tools. We further define the problem and describe a roadmap to solve the issues that have to date inhibited large scale log sharing.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"348 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126029839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust and security in pervasive networking (pervasivetrust 2005)","authors":"S. Rao","doi":"10.1109/SECCMW.2005.1588325","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588325","url":null,"abstract":"The twenty-first century is the era of the Internet. The Internet combines techniques of traditional industry and info-communication. Trustworthiness of communication is the key of healthy information society. Trust and associated security have become the important issues of all current discussions due to a variety of reasons, including data protection, economic dependency, national security and e-commerce. Trust has to be built among users for the usage of network infrastructure by protecting and providing for the confidentiality, integrity, availability and authentication of information and communication systems, including the data and information they transfer. Today there is a huge number of security technologies available on various layers of the protocol stack. All these different kinds of security technologies, which are partly already complex by themselves, make it difficult for the ordinary user to do the correct selection and configuration for his indiviual needs as well as the security requirements of the user's current ambience. The main focus of current research activities is to improve the userfriendliness for applying security technologies and therefore paving the way to a broader deployment of security in general and build trust. The workshop on ‘Trust and Security in pervasive networking’ provides a global overview of trust and security issues in pervasive communication networks. The workshop will cover an overview of existing and emerging security technologies and will describe their functionality and provide information about the threats and vulnerabilities they are defeating, their level of maturity and their complexity. The speakers are expected to address the well known solutions towards building trustworthy networks. The session also provides the limitations of current communication security in the rising multimedia communication age and the need for more complex/subtle security mechanisms and policies. The invited speakers will provide a short description of new security paradigms with the emergence of the ambient intelligence concept (infospheres and virtual paradigms) and new architectures (P2P, Virtual entities ...) and their application to sensor networks. The new environment (“always connected”, nomadic users, mobile infrastructures, heterogeneity ...) and the pregnant morphology of information systems that require a drastic change of our static vision of legislations and rules for security policies to be enforced, implemented and verified. The workshop will address new aspects of protection and security functions required for users, in a private infosphere (virtual identity, authentication with time and space, anonymity, non-observability, digital rights management, biometry), in a networked infosphere (virtual private networks, new firewalls, inter-network security), and in an open public infosphere. The invited speaker from the European Security initiative will also explain SEINIT's approach to shield the complexit","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133947390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer network forensics research workshop 2005 \"defining network forensics\"","authors":"","doi":"10.1109/seccmw.2005.1588286","DOIUrl":"https://doi.org/10.1109/seccmw.2005.1588286","url":null,"abstract":"Understanding malicious behavior on networks is becoming a critical research problem. In response to this, funding agencies such as the United States National Science Foundation have begun making funding in this area a priority. As often happens in a new research field, it is difficult to get a clear picture of what has been done and what topics fall within its purview. The goal of this workshop for 2005 is to define network forensics as a discipline and how relates to existing work in forensics and network security. It is my distinct pleasure to present these proceedings. This year, we accepted six papers and one extended abstract. The scholarship described in this work spans bodies of work from taxonomy to systems engineering to case studies of investigations. Although not a part of the formal proceedings, working sessions during the workshop will focus on definitional issues. Outcomes from these working sessions will be posted on the workshop web site. As this field continues to grow, I hope that this workshop can continue to grow and mature as a venue for the discussion and presentation of network forensics research.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130419669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FIrDA-SSL: experiments with securing communication in PANs","authors":"D. Berbecaru","doi":"10.1109/SECCMW.2005.1588324","DOIUrl":"https://doi.org/10.1109/SECCMW.2005.1588324","url":null,"abstract":"In personal area networks (PANs), a personal operating space (POS) surrounds the person up to 10 meters in all directions and it contains several types of wireless devices exchanging data between them (intra-PAN communication), or with devices from another POS or as part of broader networks (inter-PAN communication). Security is seen as a \"big issue\" both for intra and inter-PAN communication. The security mechanisms or protocols involved should also run on user devices within a reasonable amount of time. Clearly one of the first issues to be addressed in PANs is to transfer information securely and we provide a practical approach for this issue. In practice, we want to enable the exchange of \"personal\" data only to authenticated parties and doing this with standard protocols, client software or commercial products available at the moment. We developed a tool named FIrDA-SSL (Footprint Irda SSL transfer) for secure transfer of small amounts of data, like a credit card number, or a personal identification information, between devices with infrared ports. FIrDA-SSL's performance running on a Windows CE-enabled handheld PC and having a StrongARM processor at 206 MHz (i.e. HP Jornada 720) was compared with the one obtained when running FIrDA-SSL on 'powerful' Windows 2000fKP-enabled laptops. FIrDA-SSL connection latency was also confronted with the experiments run in other related work, e.g. on a Palm Pilot platform.","PeriodicalId":382662,"journal":{"name":"Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116723526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}