Internet topology measurement is an important part of network measurement. Nowadays, traceroute probing method is widely used to obtain the original route data, and the IP alias resolution technique is to identify IP ...
详细信息
Digital images are facing trustworthy crisis with the emergence of various digital image process tools and steganography tools. Current digital image forensic methods can not evaluate the digital image's trustwort...
详细信息
Digital images are facing trustworthy crisis with the emergence of various digital image process tools and steganography tools. Current digital image forensic methods can not evaluate the digital image's trustworthiness. Base on Dempster-Shafer (D-S) evidence theory, this paper proposed a new model which can effectively evaluate digital image trustworthiness. Instead of using Dempster's original rule of combination, we use feature fusion method to resolve the problem of evidence conflict. Experimental results show that the new proposed model not only can evaluate digital image trustworthiness effectively, but also resolve some problems which puzzling current digital image forensic technology.
In order to design the image hash from human being's view, we capture the perceptual characters of the image using Gabor filter which can sense the directions in the image just like human's primary visual cort...
详细信息
In order to design the image hash from human being's view, we capture the perceptual characters of the image using Gabor filter which can sense the directions in the image just like human's primary visual cortex. For a given image, we compute the reference scale, direction and block to make sure the final hash can resist against RST (Rotation, Scale, Translation) attacks while maintain the sensitivity to local malicious manipulations. In addition, it has another promising ability to locate the tampered image blocks, approximately determined tamper methods (delete, add, modify) and the original direction of each block. The ability is very useful in forensics. The experimental results show that the strategy of the reference metrics works quite well and it is much more effective than the other state of art image hash method.
The utility evaluation of DRM security policies based on fuzzy analytic hierarchy process (FAHP) and their game-theoretic adoptions were proposed from a novel perspective of the different level security and utilities&...
详细信息
The utility evaluation of DRM security policies based on fuzzy analytic hierarchy process (FAHP) and their game-theoretic adoptions were proposed from a novel perspective of the different level security and utilities' analyses. Based on the analytic hierarchy structure, the fuzzy estimation consistency matrix was employed to analyze the weights of optional security components and services, and then the gained weight values were further used for the computing of security policies' utilities and the accomplishing the game, finally yielding Nash equilibriums, that is, optimal policies profiles, as well as pre-conditions for participants. The use case for a group of the typical security policies shows that the result of the game includes two different groups of security policies profiles, as well as contents/services provider could effectively deploy a DRM system in term of the number of consumers purchasing digital contents, and average purchase, thus achieving the balance between the digital copyrights protection and real payoffs of participants.
A dynamic page view based drive-by download detection method was developed to address the challenge hidden drive-by downloads which abuse inline linking dynamics creation and obfuscation. The method uses a script engi...
详细信息
A dynamic page view based drive-by download detection method was developed to address the challenge hidden drive-by downloads which abuse inline linking dynamics creation and obfuscation. The method uses a script engine to execute page scripts with tools to reveal the script's actions and inline linking identification mechanisms and rebuilds the dynamic page view of the visited page by recursively analyzing the inline pages. The system then detects drive-by downloads based on the rebuilt dynamic page view. Tests on a prototype based on the open-sourced PHoneyC framework to detect 89 drive-by download samples showed that single page views in this paper had a detection rate of 29.2%, static page views had a detection rate of 43.8%, and the dynamic page views had a detection rate of 70.8%. Thus, the dynamic detection method has a much higher detection rate.
The law of SMS (short message service) network growth is analyzed to understand the evolution of SMS communication network, and the deficiencies of existing complex network models that are used to describe real SMS ne...
详细信息
The law of SMS (short message service) network growth is analyzed to understand the evolution of SMS communication network, and the deficiencies of existing complex network models that are used to describe real SMS network are pointed out. Then, a new dynamic evolution model is proposed. The model considers both the network node removing and the inner and outer growth of the network, so that the dynamic evolution of a true network can be described in more detail. Experimental results show that the proposed model describes the growth of SMS network desirably, and the model can more objectively simulate and depict the features and evolution of the SMS complex network.
It is well known that the Chinese Remainder Theorem (CRT) can greatly improve the performances of RSA cryptosystem in both running times and memory requirements. However, if the implementation of CRT-based RSA is ca...
详细信息
It is well known that the Chinese Remainder Theorem (CRT) can greatly improve the performances of RSA cryptosystem in both running times and memory requirements. However, if the implementation of CRT-based RSA is careless, an attacker can reveal some secret information by exploiting hardware fault cryptanalysis. In this paper, we present some fault attacks on a type of CRT-RSA algorithms namely BOS type schemes including the original BOS scheme proposed by Blomer, Otto, and Seifert at CCS 2003 and its modified scheme proposed by Liu et al. at DASC 2006. We first demonstrate that if some special signed messages such as m = 0, ±1 are dealt carelessly, they can be exploited by an adversary to completely break the security of both the BOS scheme and Liu et al.'s scheme. Then we present a new permanent fault attack on the BOS scheme with a success probability about 25%. Lastly, we propose a polynomial time attack on Liu et al.'s CRT-RSA algorithm, which combines physical fault injection and lattice reduction techniques when the public exponent is short.
A successful transaction of digital contents is primarily dependent on security policies, trust relationships and benefit equilibriums among various participants in a DRM (Digital Rights Management)-enabling contents ...
详细信息
A successful transaction of digital contents is primarily dependent on security policies, trust relationships and benefit equilibriums among various participants in a DRM (Digital Rights Management)-enabling contents value chain ecosystem. We first analyzed basic value chain architectures in existence, together with some fundamental security and trust requirements. And then, a state-of- the-art anatomy of the security and trust related to DRM was presented from different stakeholder' perspectives. Next, some challenges for multi-party mutual trust, not just inclined to any of participants, were proposed based on the holistic consideration of the digital contents/rights protection and the benefits balance. Finally, a conclusion was drawn that the rights-benefits-centric DRM ecosystem and the resulting trust relationship are crucial for the survivability of the contents industry.
Interactive network traffic replay is the newest method for testing and evaluation of network devices such as Firewalls, IPSes, routers, switches, etc. Currently state-checking method is used for interactive TCP traff...
详细信息
Interactive network traffic replay is the newest method for testing and evaluation of network devices such as Firewalls, IPSes, routers, switches, etc. Currently state-checking method is used for interactive TCP traffic replay. This paper proposes a new method for interactive TCP traffic replay which is based on the balance status between transmitted and received packets. By checking the balance conditions before sending out TCP packets, the method can significantly reduce the cost of state-checking and enhance the replay performance. The authors made a comparison on the differences of replay methods when introducing the balance mechanism. The efficiency of the method is also investigated and evaluated from aspects of a single TCP session, multi-session traffic, packet losses and latency. Experimental results show that the method outperforms the original state-checking method when replaying actual TCP traffics.
To solve the drawbacks of Dempster rule and improved rule of combination, a novel evidence combination method based on proportional conjunctive and complementary pooling criterion was presented. Firstly, the advantage...
详细信息
To solve the drawbacks of Dempster rule and improved rule of combination, a novel evidence combination method based on proportional conjunctive and complementary pooling criterion was presented. Firstly, the advantages and disadvantages of Dempster rule of combination were analyzed. Secondly, a new mass function based on proportional belief criterion of conjunctive and complementary belief was combined. Finally, the results of numerical examples show that the proposed approach of combination can not only maintain the advantages of original Dempster rule of combination, but also make up for its disadvantages.
暂无评论