Since the emergence of adversarial examples brings great security threat to deep neural network which is widely used in various fields, their forensics become very important. In this paper, a lightweight model for the...
详细信息
The software application of the discrete logarithms on the "large" finite field is studied. The most effective algorithm for the problem is the general number field sieve (GNFS). Focusing on the theory of GN...
详细信息
For the study of new computer architecture inspired by brain, implementing neuron function on hardware has become an emerging research direction. To study the feasibility of biological neuron implementation and accele...
详细信息
The method based on index system is a typical quantitative method for information security risk assessment. But, because of the complexity of the safety-related factors, during the process ofbuilding its index system,...
详细信息
ISBN:
(纸本)9781785610899
The method based on index system is a typical quantitative method for information security risk assessment. But, because of the complexity of the safety-related factors, during the process ofbuilding its index system, it will inevitably produce some irrelevant and redundant indicators index, thereby resulting in the deviation of the assessment results. To solve this problem, this paper proposes a new analysis method named SGCAM (Sobol and Gray relational clustering Comprehensive Analysis Method) based on Sobol based global sensitivity analysis method and gray relational clustering analysis method. Using this method, we can cut irrelevant indicators, merge redundant indicators, and optimize the index system ultimately.
In order to assess network security threats better, we model the attacker's and defender's behavior based on attackdefense graph from the perspective of both attacker and defender, which lays the foundation of...
详细信息
ISBN:
(纸本)9781785610899
In order to assess network security threats better, we model the attacker's and defender's behavior based on attackdefense graph from the perspective of both attacker and defender, which lays the foundation of the further research for the scientific and precise information security threat assessment. Due to the existing problems of generating traditional attack-defense graph (e.g. explosion of state space, and the large-scale and complex generation of attack-defense graph), we in this paper propose a method for generating attack-defense graph based on state reduction, then we model the behavior of attacker and defender in network security. Finally, the method and the model proposed in this paper are proved to be scientific and effective within a typical network scenario.
To the active-basis-choice decoy-state quantum-key-distribution systems with detector efficiency mismatch, we present a modified attack strategy, which is based on the faked states attack, with quantum nondemolition m...
详细信息
To the active-basis-choice decoy-state quantum-key-distribution systems with detector efficiency mismatch, we present a modified attack strategy, which is based on the faked states attack, with quantum nondemolition measurement ability to restress the threat of detector efficiency mismatch. Considering that perfect quantum nondemolition measurement ability doesn't exist in real life, we also propose a practical attack strategy using photon number resolving detectors. Theoretical analysis and numerical simulation results show that, without changing the channel, our attack strategies are serious threats to decoy-state quantum-key-distribution systems. The eavesdropper may get some information about the secret key without causing any alarms. Besides, the lower bound of detector efficiency mismatch to run our modified faked states attack successfully with perfect quantum nondemolition measurement ability is also given out, which provides the producers of quantum-key-distribution systems with a reference and can be treated as the approximate secure bound of detector efficiency mismatch in decoy-state quantum-key-distribution systems.
The management of Internet of Things (IoT) devices is becoming increasingly complex. One of the reasons is that IoT device manufacturers are different, and there are different degrees of heterogeneity in service, tech...
详细信息
Malware homology identification is important in attacking event tracing, emergency response scheme generation, and event trend prediction. Current malware homology identification methods still rely on manual analysis,...
详细信息
Malware homology identification is important in attacking event tracing, emergency response scheme generation, and event trend prediction. Current malware homology identification methods still rely on manual analysis, which is inefficient and cannot respond quickly to the outbreak of attack events. In response to these problems, we propose a new malware homology identification method from a gene perspective. A malware gene is represented by the subgraph, which can describe the homology of malware families. We extract the key subgraph from the function dependency graph as the malware gene by selecting the key application programming interface(API) and using the community partition algorithm. Then, we encode the gene and design a frequent subgraph mining algorithm to find the common genes between malware families. Finally, we use the family genes to guide the identification of malware based on homology. We evaluate our method with a public dataset, and the experiment results show that the accuracy of malware classification reaches 97% with high efficiency.
Proprietary(or semi-proprietary)protocols are widely adopted in industrial control systems(ICSs).Inferring protocol format by reverse engineering is important for many network security applications,e.g.,program tests ...
详细信息
Proprietary(or semi-proprietary)protocols are widely adopted in industrial control systems(ICSs).Inferring protocol format by reverse engineering is important for many network security applications,e.g.,program tests and intrusion *** protocol reverse engineering methods have been proposed which are considered time-consuming,tedious,and ***,automatical protocol reverse engineering methods have been proposed which are,however,neither effective in handling binary-based ICS protocols based on network traffic analysis nor accurate in extracting protocol fields from protocol *** this paper,we present a framework called the industrial control system protocol reverse engineering framework(ICSPRF)that aims to extract ICS protocol fields with high *** is based on the key insight that an individual field in a message is typically handled in the same execution context,e.g.,basic block(BBL)*** a result,by monitoring program execution,we can collect the tainted data information processed in every BBL group in the execution trace and cluster it to derive the protocol *** evaluate our approach with six open-source ICS protocol *** results show that ICSPRF can identify individual protocol fields with high accuracy(on average a 94.3%match ratio).ICSPRF also has a low coarse-grained and overly fine-grained match *** the same metric,ICSPRF is more accurate than AutoFormat(88.5%for all evaluated protocols and 80.0%for binary-based protocols).
With the advent of Industry 4.0,water treatment systems(WTSs)are recognized as typical industrial cyber-physical systems(iCPSs)that are connected to the open *** information technology(IT)benefits the WTS in the aspec...
详细信息
With the advent of Industry 4.0,water treatment systems(WTSs)are recognized as typical industrial cyber-physical systems(iCPSs)that are connected to the open *** information technology(IT)benefits the WTS in the aspects of reliability,efficiency,and ***,the vulnerabilities exposed in the communication and control infrastructure on the cyber side make WTSs prone to cyber *** traditional IT system oriented defense mechanisms cannot be directly applied in safety-critical WTSs because the availability and real-time requirements are of great *** this paper,we propose an entropy-based intrusion detection(EBID)method to thwart cyber attacks against widely used controllers(e.g.,programmable logic controllers)in WTSs to address this *** of the varied WTS operating conditions,there is a high false-positive rate with a static threshold for ***,we propose a dynamic threshold adjustment mechanism to improve the performance of *** validate the performance of the proposed approaches,we built a high-fidelity WTS testbed with more than 50 measurement *** conducted experiments under two attack scenarios with a total of 36attacks,showing that the proposed methods achieved a detection rate of 97.22%and a false alarm rate of 1.67%.
暂无评论