{"title":"On Running Disabled Networking Features: A Taxonomy with Security Implications","authors":"Dtv Ramakrishna Rao, Manjul Khandelwal","doi":"10.1109/COMSNETS59351.2024.10427438","DOIUrl":"https://doi.org/10.1109/COMSNETS59351.2024.10427438","url":null,"abstract":"The attack surface of a networking system is related to the number of features it supports. To reduce attack surface of the system, an important step is to disable unused features. Generally, this practice is considered sufficient to tackle the security implications of the unused features. This paper argues that this practice is necessary but not sufficient. To support this thesis, a taxonomy is provided which illustrates various ways in which a seemingly disabled feature may get a chance to run.","PeriodicalId":518748,"journal":{"name":"2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"116 2","pages":"582-585"},"PeriodicalIF":0.0,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140532737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ankit Chouhan, Ashok Parmar, Kamal M. Captain, Pawan Maurya, Jignesh Patel
{"title":"Enhancing Cooperative Spectrum Sensing in Cognitive Radio Systems: Mitigating Byzantine Attacks with a Weighted Algorithm","authors":"Ankit Chouhan, Ashok Parmar, Kamal M. Captain, Pawan Maurya, Jignesh Patel","doi":"10.1109/COMSNETS59351.2024.10427318","DOIUrl":"https://doi.org/10.1109/COMSNETS59351.2024.10427318","url":null,"abstract":"Cooperative spectrum sensing (CSS) is a key approach in cognitive radio (CR) systems for dealing with fading, shadowing, and concealed node problems. CSS improves detection performance by utilizing the spatial range that results from the cooperative secondary users (CSUs). As part of centralized CSS, these CSUs collaborate to share information with a fusion center (FC), which makes global decisions. However, malicious users (MUs) can significantly decrease the sensing operation's accuracy. The crucial problem of Byzantine attacks is addressed in this paper through a weighted algorithm for MU detection in CSS environments. The proposed weighted algorithm efficiently detects and eliminates the effects of MU. A comprehensive analysis utilizes simulations of how well the proposed algorithm performs. The results are provided in a series of plots that show how superior the proposed algorithm is in terms of its resistance to Byzantine attacks and its capacity to increase CSS's overall dependability in the cognitive radio network (CRN).","PeriodicalId":518748,"journal":{"name":"2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"116 1-3","pages":"465-469"},"PeriodicalIF":0.0,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140532742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomaly Detection in IoT Networks Based on Intelligent Security Event Correlation","authors":"Igor V. Kotenko, Diana Levshun","doi":"10.1109/COMSNETS59351.2024.10426939","DOIUrl":"https://doi.org/10.1109/COMSNETS59351.2024.10426939","url":null,"abstract":"Modern Internet of Things networks combine many devices and sensors that transmit and process large amounts of data. Security tools identify security events that contain information about detected system or network states. In turn, high-performance data anomaly detection methods are required to ensure stability and reliability of work processes. Information about the correlation of identified security events can be used to detect and explain deviations from normal states. This study proposes an anomaly detection approach based on the causal correlation of security events using machine learning. The proposed approach does not require prior knowledge of event scenarios. Using cluster analysis and a convolutional recurrent neural network, we construct a security state correlation graph corresponding to the normal behavior of the system. Cluster analysis determines the similarity of events to each other. A convolutional LSTM, analyzes the spatio-temporal relationship of events. Using the identified event correlation thresholds, we look for anomalies in real time. Experimental results on an Internet of Things sensor dataset show that the proposed method is efficient in anomaly detection tasks.","PeriodicalId":518748,"journal":{"name":"2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"294 5","pages":"816-824"},"PeriodicalIF":0.0,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140532823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}