Security, Privacy, and Anonymity in Computation, Communication, and Storage
SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings
- 2017
- Book
- Editors
- Guojun Wang
- Dr. Mohammed Atiquzzaman
- Zheng Yan
- Kim-Kwang Raymond Choo
- Book Series
- Lecture Notes in Computer Science
- Publisher
- Springer International Publishing
About this book
This book constitutes the refereed proceedings of 11 symposia and workshops held at the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017.
The total of 75 papers presented in this volume was carefully reviewed and selected from a total of 190 submissions to all workshops:
UbiSafe 2017: The 9th IEEE International Symposium on UbiSafe Computing
ISSR 2017: The 9th IEEE International Workshop on Security in e-Science and e-Research
TrustData 2017: The 8th International Workshop on Trust, Security and Privacy for Big Data
TSP 2017: The 7th International Symposium on Trust, Security and Privacy for Emerging Applications
SPIoT 2017: The 6th International Symposium on Security and Privacy on Internet of Things
NOPE 2017: The 5th International Workshop on Network Optimization and Performance Evaluation
DependSys 2017: The Third International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications
SCS 2017: The Third International Symposium on Sensor-Cloud Systems
WCSSC 2017: The Second International Workshop on Cloud Storage Service and Computing
MSCF 2017: The First International Symposium on Multimedia Security and Digital Forensics
SPBD 2017: The 2017 International Symposium on Big Data and Machine Learning in Information Security, Privacy and Anonymity
Table of Contents
-
Frontmatter
-
The 9th IEEE International Symposium on UbiSafe Computing (UbiSafe 2017)
-
Frontmatter
-
MTIV: A Trustworthiness Determination Approach for Threat Intelligence
Lei Li, Xiaoyong Li, Yali GaoAbstractWith the gradually sharing of threat intelligences, users concern more about their trustworthiness, which is difficult to be judged. Some threat intelligence sharing platforms choose to show the risk or credibility, and inform users the trustworthiness of the threat intelligence. Several researchers have proposed the requirements and techniques for threat intelligence trust assessment. However, they do not present any tool-based or model solutions. In this paper, we present a Trustworthiness Determination Approach for Threat Intelligence (MTIV) to make up these shortcomings. First, we propose a framework to excavate threat intelligence via multiple sharing platforms, and extract multidimensional trustful features of the threat intelligence. Based on these, contributions of dimensional trustful features to the trustworthiness determination can be derived. Then we introduce Deep Belief Network (DBN) to determine the trustworthiness of the threat intelligence. The experimental results verify that MTIV is more effective than traditional methods. Our work will be of benefit to build a more credible threat intelligence sharing platform, and enhance the capability of real-time detection and resisting the cyberspace attacks. -
Distributed Caching Based Memory Optimizing Technology for Stream Data of IoV
Xiaoli Hu, Chao Li, Huibing Zhang, Hongbo Zhang, Ya ZhouAbstractWith the expansion of the Internet of Vehicle’s system size, traditional storage architecture has encountered performance bottleneck in terms of throughput and scalability. To address these issues, the essay builds a distributed caching system by using cache node, major node and query interface. To implement storage logic, vehicular terminal dynamically sends data, and the distributed business process of stream data is achieved by using cache system and compressed function in protocol server. Protocol server also assists database server in compression storage. Data from our IoV platform is adopted for testing, and experimental results show that memory optimizing system effectively improves throughput and scalability. -
Secure Transfer Protocol Between App and Device of Internet of Things
Zhaojie Xu, Xiaoyong LiAbstractCommunication security is one of the key component of Internet of Things. Now we can communicate with smart device, such as microwave oven, camera, and control it using App in our smart phone, but due to the poor computing power of smart device, it tends to be intractable to protect this communication from attack. By analyzing the security threats faced during the process of smart device and App authenticating each other’s identity, this paper proposed a lightweight transfer protocol for smart device, and introduced “Authentication Center” to help with authentication for smart device and App. In consideration of poor computing power of smart device, the lightweight protocol achieves effective reduction of network resource usage. Acting as a hub, the Authentication Center does the heavy certification and authorization work as well as the management of smart device. This protocol can protect data confidentiality, data integrity against replay attack, man-in-the-middle attack by ensuring the identities of device and App with the help of Authentication Center. -
Rogue Access Points Detection Based on Theory of Semi-Supervised Learning
Xiaoyan Li, Xiaoyong LiAbstractIt is very dangerous for wireless client to connect with rogue access point. Attackers could eavesdrop or modify client’s information via rogue access point, therefore, rogue access point can be seen as the most serious threats in wireless local area network (WLAN). In this paper, we proposed a novel approach that can detect rogue access points (AP) quickly and accurately. We take advantage of Time-stamp field and signal field in the 802.11 beacon frame as the data in Gaussian distribution algorithm and Native Bayes Classify to generate the fingerprint of access point. The fingerprint is unique to each access point, which cannot be spoofed. In the detection process, we add sliding window and Semi-Supervised Learning, that give our method the ability to take dynamic self-adjustment. Experimental results indicated that the proposed approach could detect rogue access points more quickly and accurately compare with existing methods. -
Phishing Detection Method Based on Borderline-Smote Deep Belief Network
Jiahua Zhang, Xiaoyong LiAbstractWith the rapid development of Internet, phishing and other frauds are becoming more and more serious. Criminals posing as banks, electricity providers, social networking sites to send fraudulent information to induce users to log on, steal user information, so that the vast numbers of users and financial institutions suffered property and economic losses. How to accurately and effectively identify phishing related Internet risks has been a major concern of the Internet. This paper analyzes the development history of phishing prevention and control, and presents a Borderline-Smote (Synthetic Minority Over-sampling Technique) DBN (Deeping Belief Network) method to detect phishing. The method uses deep learning phishing detection method based on web documents content and other features to improve 1% on the recognition accuracy. Furthermore the paper uses Borderline-Smote to solve the imbalanced data problem in the training of phishing detection, and further improve 2% on the F-value and recall rate. -
Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field
Ziwen Liu, Liang Fang, Lihua Yin, Yunchuan Guo, Fenghua LiAbstractSecurity management center needs to detect and delete many similar records of the device status information to reduce the data redundancy before analyzing the status of the supervised device. Most similarity record detection algorithms are based on the “sort-merge” model. Detection algorithms usually sort data set with keywords before detection of similar data. Existing methods of generating keywords tend to have the following problems: the keywords is not accurate, or multiple keywords are generated for sorting of multiple keywords. The paper proposes a method of synthesizing keywords by multiple encoding fields, and it is verified that this method can significantly optimize the performance of algorithm through experiment. We also compare the performance of each common detection algorithm through experiment. -
Security Review and Study of DoS Attack on DNS in the International Roaming EPC_LTE Network
Ya’nan Tian, Wen’an Zhou, Wenlong LiuAbstractThe communication standard Long Term Evolution (LTE) developed by 3GPP is becoming the mainstream technology of the next generation mobile communication, the new features meet the business needs and improve the user experience, but also bring some security threats. In this paper, we introduce the LTE roaming architecture, the attach procedure and the DNS resolution procedure. Then we analyze that MME initiate the DNS request before the authentication is completed based on the procedures and OpenAirInterface (OAI) code, which will lead to a large load on DNS server, this scheme is very vulnerable to DoS/DDoS attacks on DNS server. Finally, according to the characteristics of LTE, we propose a enhancement scheme in MME and analyze the feasibility. -
A SYN Flood Detection Method Based on Self – similarity in Network Traffic
Daxiu Zhang, Xiaojuan Zhu, Lu WangAbstractSince the normal data fail to be transmitted under the SYN Flood attack, the paper proposes a detection method which can rapidly and accurately detect the SYN Flood attack. First, it takes a real - time intercept of network traffic, and selects network traffic to discrete. Second, the fitting function can be achieved by fitting the discrete network traffic repeatedly. Finally, the integral value of the fitting function is calculated, which is used to compare with the Hurst value. The SYN Flood attack can be effectively detected by comparing the integral value, which calculated by the fitting function curve, with the Hurst value of the network traffic. -
Annotating Network Service Fault Based on Temporal Interval Relations
Leonard Kok, Sook-Ling Chua, Chin-Kuan Ho, Lee Kien Foo, Mohd Rizal Bin Mohd RamlyAbstractThe internet has greatly revolutionized the communication and has undoubtedly affects our everyday life from work to entertainment. In order to uphold the quality of network service, Communication Service Providers (CSPs) are striving to keep network service faults to a minimum. To achieve this, they need to detect early of any potential network problems and resolve service incidents promptly before customers are impacted. However, to train a supervised learning algorithm to automatically detect service disruptions, the training data needs to be labeled. It is certainly costly and time consuming process to rely on domain experts to annotate the data. This paper addresses the data annotation problem based on temporal interval relations. We evaluated our method on real-world data and compared it with baseline method.
-
-
The 9th IEEE International Workshop on Security in e-Science and e-Research (ISSR 2017)
-
Frontmatter
-
An Anonymous Identity-Based Authentication Scheme in Vector Network
Jie Yu, Mangui LiangAbstractVector Network is a new type of network, which is light connection and enables QoS. Vector Network provides two types of services: best effort and QoS guaranteed. The latter requires strict access authentication, which should be not only safe and convenient for use, but also able to protect the user’s privacy, and prevent hackers from tracking. Therefore, this paper proposes an improved scheme for a hierarchical identity based on signature and authentication, which is used to meet the requirements of Vector Network authentication. At last we achieve the scheme in experiment and point out that it has advantages in terms of efficiency and security over traditional network.
-
- Title
- Security, Privacy, and Anonymity in Computation, Communication, and Storage
- Editors
-
Guojun Wang
Dr. Mohammed Atiquzzaman
Zheng Yan
Kim-Kwang Raymond Choo
- Copyright Year
- 2017
- Publisher
- Springer International Publishing
- Electronic ISBN
- 978-3-319-72395-2
- Print ISBN
- 978-3-319-72394-5
- DOI
- https://doi.org/10.1007/978-3-319-72395-2
Accessibility information for this book is coming soon. We're working to make it available as quickly as possible. Thank you for your patience.