The traditional Firewall and Intrusion Detection System(IDS) working at the network layer can’t fully understand the application layer protocols, and there must be some omissions and errors about SQL Injection, cross...
详细信息
ISBN:
(纸本)9781612848334
The traditional Firewall and Intrusion Detection System(IDS) working at the network layer can’t fully understand the application layer protocols, and there must be some omissions and errors about SQL Injection, cross site scripting attacks (XSS), privacy leaks and so on. In this paper, a reverse proxy architecture based web intrusion prevention system (RPWIPS) is designed and implemented, and the mechanism and key technologies of RPWIPS are given. It can be deployed on multi-platform. Remote agent and deep detection are used to check all the requests from the client and responses of web servers. Results show that the system can protect website effectively, prevent intrusions and privacy leaks very well, and the average delay is low.
In order to solve the problem of asymmetric key management in mobile ad hoc networks, a new distributed asymmetric key management scheme based on lite CA public key authentication framework and Shamir secret sharing s...
详细信息
In order to solve the problem of asymmetric key management in mobile ad hoc networks, a new distributed asymmetric key management scheme based on lite CA public key authentication framework and Shamir secret sharing scheme was presented. The public key could be certified locally by the mechanism of distributed lite CA certification authentication and so the certification management was not need in the scheme. It also avoided the inherent key escrow problem in identity-based cryptography to combine with the advantages of certificateless public key cryptography and provided the ability to resist the public key substitution attacks. security analysis and experiment results showed that the scheme is secure and efficient in implementation.
In this paper, we propose an object-oriented attack model to represent a protocol attack in WSN detailedly. The model describes multiple attributes of an attack, including its principle, impact, interdependent relatio...
详细信息
In this paper, we propose an object-oriented attack model to represent a protocol attack in WSN detailedly. The model describes multiple attributes of an attack, including its principle, impact, interdependent relationships with other attacks, etc. Then, on the basis of the attack model and the FSM description method, we present a security testing approach for WSN protocols, in order to evaluate the security of the tested protocols. Finally, we take the TinyPK protocol and Sybil attack for example to implement our design, and the Protocol security Testing Report shows as expected that the TinyPK cannot resist the Sybil attack. Thus, the security testing approach proposed is feasible.
In this paper, we develop a new subspace based multiuser carrier frequency offset (CFO) estimation scheme for multi-input multi- output (MIMO) orthogonal frequency division multiple access (OFDMA) uplink transmission....
详细信息
In this paper, we develop a new subspace based multiuser carrier frequency offset (CFO) estimation scheme for multi-input multi- output (MIMO) orthogonal frequency division multiple access (OFDMA) uplink transmission. We exploit the rank reduction approach by equipping multiple antennas at the receiver, in which the CFO of each user is derived blindly using one dimension (1-D) search individually. The proposed scheme supports the generalized subcarrier assignment scheme and full loaded transmission with all subcarriers being allocated to users. Numerical results are provided to corroborate the proposed studies.
Integrity measurement is just one of the most important features in a trusted computing platform to provide evidence of platform configuration and behavior. Each set of software instructions(binary code) is measured a...
详细信息
Integrity measurement is just one of the most important features in a trusted computing platform to provide evidence of platform configuration and behavior. Each set of software instructions(binary code) is measured and recorded before it is executed. Especially, all of boot components which be recorded in pre-boot stage can't be re-measured until the platform is rebooted. However, the reality is that many components belong to pre-boot stage, such as BIOS, Boot Loader and MBR, are easily modified or updated in runtime environment. If these updated results of components are treated as configuration requirements for a remote server-side to verify the access request, the remote network access connection will fail. It must restart the host to re-measure there components, and the result of the new measure is not guaranteed right absolutely. We solve this problem by embedding Integrity Measurement Agency Component(IMAC) which has the capability of monitoring transformation, verifying credibility, updating Platform Configuration Registers and recording integrity measurement logs in Linux kernel. The result of performance analysis demonstrates that the method is feasible and credible.
Cloud computing emerges as a new computing paradigm which aims to provide reliable, customized and QoS guaranteed dynamic computing environments for endusers. Although cloud computing industry promises tremendous pros...
详细信息
In a recent paper [Chin. Phys. Lett 25(2008)1187], a quantum secret sharing scheme between multiparty and multiparty was presented. We show that the protocol is not secure because the last member in Alice's group c...
详细信息
In a recent paper [Chin. Phys. Lett 25(2008)1187], a quantum secret sharing scheme between multiparty and multiparty was presented. We show that the protocol is not secure because the last member in Alice's group can illegally obtain most secret messages without introducing any error. Finally, a possible way to avoid the security flaw is suggested.
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ...
详细信息
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a good approach enabling the data owner to retain its control over the outsourced data. Searchable encryption is a cryptographic primitive allowing for private keyword based search over the encrypted database. The above setting of enterprise outsourcing database to the cloud requires multi-user searchable encryption, whereas virtually all of the existing schemes consider the single-user setting. To bridge this gap, we are motivated to propose a practical multi-user searchable encryption scheme, which has a number of advantages over the known approaches. The associated model and security requirements are also formulated. We further discuss to extend our scheme in several ways so as to achieve different search capabilities.
Content sharing is one of the most significant issues of Digital Rights Management (abbr. DRM). Various schemes for content sharing have been presented in the past years. However, the main goals of these schemes are t...
详细信息
Content sharing is one of the most significant issues of Digital Rights Management (abbr. DRM). Various schemes for content sharing have been presented in the past years. However, the main goals of these schemes are to solve portability problems instead of rational sharing between different users who are not family members. In this work, we propose an initial step toward this rational sharing and present a general sharing model based on proxy re-encryption. Our model can support the flexible sharing mechanism, with which the user can choose any of the purchased content to share with any legal device, and the content provider can know and limit the number of sharing devices to achieve some novel DRM policies such as pay-per-sharing. To our best knowledge, our sharing model is the first model for content sharing between different users' devices who are not family members using proxy re-encryption. With rational applications, our model can benefit for both the user and content provider to achieve win-win development.
Failure detection is a key technology in tolerant system. Failure detectors without adaptive mechanism cannot meet the requirements of QOS (quality of service) of applications because of the variations of the network ...
详细信息
暂无评论