The proceedings contain 35 papers. The topics discussed include: a prior distribution for anti-spam statistical Bayesian model;a PVSS scheme based on Boolean operations with improved contrast;adaptive trust aware comm...
ISBN:
(纸本)9782953244311
The proceedings contain 35 papers. The topics discussed include: a prior distribution for anti-spam statistical Bayesian model;a PVSS scheme based on Boolean operations with improved contrast;adaptive trust aware community in unstructured peer to peer network;a pairing identity based key management protocol for heterogeneous wireless sensor networks;a protocol for secure electronic remote voting;a trusted platform module based anti-forensics system;an efficient multi-parameter group leader selection scheme for wireless sensor networks;design of a simulation framework to evaluate trust models for collaborative intrusion detection;entrusting remote software executed in an untrusted computation helper;formal verification of IEEE 802.16 security sublayer using scyther tool;and related-key cryptanalysis of RAIDEN.
This article contains the report on AIMS 2010, which was held June 23-25, 2010 at the Department of Informatics ( IFI), University of Zurich, Switzerland and which was driven by the theme "Mechanisms for Autonomo...
详细信息
This article contains the report on AIMS 2010, which was held June 23-25, 2010 at the Department of Informatics ( IFI), University of Zurich, Switzerland and which was driven by the theme "Mechanisms for Autonomous Management of networks and services''. Furthermore, the report also synopsizes ISSNSM 2010, which was run June 21-23, 2010 at the same location and which offered a practical summer school on selected topics in network and service management.
This article contains the report on AIMS 2010, which was held June 23-25, 2010 at the Department of Informatics (IFI), University of Zürich, Switzerland and which was driven by the theme "Mechanisms for Auto...
详细信息
Cloud computing is the development drift of the IT industry. This modern cloud computing has grabbed remarkable attention in recent days owing to its high-quality on-demand service accessibility and flexible nature. I...
详细信息
ISBN:
(纸本)9789819780501;9789819780518
Cloud computing is the development drift of the IT industry. This modern cloud computing has grabbed remarkable attention in recent days owing to its high-quality on-demand service accessibility and flexible nature. It not only has huge advantages but also has numerous security shortcomings that no organization can afford to overlook. The security perspective of cloud computing infrastructure is often viewed to be the prime element, as data and services of the cloud are not confined to a single organization. Therefore, cloud security plays a crucial role to establish trust among the cloud service providers and the multiple cloud service consumers. Subsequently, trust management ensures both security and privacy in the cloud computing infrastructure. However, in the traditional cloud computing infrastructure all the cloud entities once authorized can get access to the cloud services throughout the life cycle of the session. As a result, it is vulnerable to insider attack. Therefore, in this paper, we have proposed a Zero Trust network Access (ZTNA) architecture that intends to continuously verify a cloud entity throughout the lifecycle of the session, regardless of the fact that the entity is inside/outside the cloud computing infrastructure. Further, we have analyzed the security aspects of the proposed architecture that ensure our architecture is well-secured against relevant security attacks.
Focusing on the service access requirements of edge nodes, aiming at the problems of narrow network bandwidth, poor network quality and low transmission rate of the edge nodes, a node service dynamic demand prediction...
详细信息
Aiming at the shortcomings of current location privacy protection methods for internet of vehicles (IoV) in terms of balancing location privacy and service availability, high communication overhead, and susceptibility...
详细信息
Cloud services increasingly generates enormous Internet traffic. Much of it such as rich media traffic is not highly sensitive, but prefers some sort of protection. The traditional end-to-end encryption such as TLS is...
详细信息
ISBN:
(纸本)9789819608041;9789819608058
Cloud services increasingly generates enormous Internet traffic. Much of it such as rich media traffic is not highly sensitive, but prefers some sort of protection. The traditional end-to-end encryption such as TLS is costly and has issues such as increased latency, while the simple anonymity solutions cannot resist traffic analysis attacks. In this paper, we propose FlowShredder, a protocol-independent and in-networkservice to secure such traffic in the cloud. FlowShredder aims to break the association between packets, data flow and hosts by obfuscating the packet header (some payload if needed). Without the context of flow and hosts, packets are of little value to the adversary. The operation is carried out at cloud gateways, without encrypting the payload. Its simple logic can therefore be executed within a single pipeline of the Tofino programmable switch, to ensure wire-speed performance without the scalability issue. Being protocol-independent and operating in-network at wire speed make FlowShredder a practical and generic securityservice to protect the cloud traffic. In addition, FlowShredder can work with end-to-end encryption such as 0-RTT TLS for enhanced protection. We implement FlowShredder in P4 switches. Experiments show that FlowShredder can effectively resist the traffic analysis attack with supervised learning techniques.
Software Define network is a platform for network architecture used to create and design the virtual network hardware components, so it can be modified with dynamic connection settings with ease of implementation. The...
详细信息
ISBN:
(纸本)9783031751691;9783031751707
Software Define network is a platform for network architecture used to create and design the virtual network hardware components, so it can be modified with dynamic connection settings with ease of implementation. The SDN controller is in charge of executing various network applications and preserving networkservices and functions. Due to the complication of the SDN architecture, the SDN faces numerous security challenges despite all of its incredible advantages. Because of its centralized and complex architecture, distributed denials of service (DDoS) attacks are frequent against SDN, particularly at the control layer where they can affect the entire network by using multiple resources at particular interval of time. Machine learning methods are utilized to quickly detect these types of threats. In current work, machine learning approach is proposed to detect the DDoS attack in multi-controller SDN environment of SDN. Experimental results shows that machine learning technique provides better accuracy and detection rate.
Onion messages (OMs) are private messages sent between nodes in the Lightning network (LN) using onion routing. While they are intended to enable interesting applications such as static invoices, refunds, and asynchro...
详细信息
ISBN:
(纸本)9783031786785;9783031786792
Onion messages (OMs) are private messages sent between nodes in the Lightning network (LN) using onion routing. While they are intended to enable interesting applications such as static invoices, refunds, and asynchronous payments, onion messages may also be used for unintended applications such as streaming or spam. To mitigate this, LN nodes can impose a rate limit on forwarding onion messages. However, if not carried out carefully, the rate limit can expose the network to a denial of service (DoS) attack, where an adversary may disrupt or degrade the OM service by flooding the network. This DoS threat is particularly concerning because, under current specifications, a single OM can traverse through hundreds of nodes, affecting all the nodes on its way. In addition, the adversary can hide their true identity thanks to the privacy-preserving feature of onion routing. To address this threat, we propose a simple solution with two main components. The first component limits the distance over which OMs can travel. For this purpose, we propose two methods: a hard leash and a soft leash. The hard leash imposes a strict limit on how far OMs can travel, while the soft leash makes it exponentially more difficult for OMs to traverse long distances. While the first method requires changes in the message format, the second method can easily be adopted without altering OMs. The second component of our solution consists of a set of simple yet effective forwarding and routing rules. We demonstrate that when these rules and the proposed leashes are applied, an adversary cannot degrade the onion messaging service, assuming that the adversary does not control a significant fraction of funds in the network.
Software-defined networking and network function virtualization have brought unparalleled flexibility in defining and managing network architectures. With the widespread diffusion of cloud platforms, more resources ar...
详细信息
ISBN:
(纸本)9789819608072;9789819608089
Software-defined networking and network function virtualization have brought unparalleled flexibility in defining and managing network architectures. With the widespread diffusion of cloud platforms, more resources are available to execute virtual network functions concurrently, but the current approach to defining networks in the cloud development is held back by the lack of tools to manage the composition of more complex flows than simple sequential invocations. In this paper, we advocate for the usage of choreographic programming for defining the multiparty workflows of a network. When applied to the composition of virtual network functions, this approach yields multiple advantages: a single program expresses the behavior of all components, in a way that is easier to understand and check;a compiler can produce the executable code for each component, guaranteeing correctness properties of their interactions such as deadlock freedom;and the bottleneck of a central orchestrator is removed. We describe the proposed approach and show its feasibility via a case study where different functions cooperatively solve a security monitoring task.
暂无评论