top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Blockchain - ICBC 2022 : 5th international conference, held as part of the services conference federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, proceedings / / edited by Shiping Chen, Rudrapatna K. Shyamasundar, and Liang-Jie Zhang
Blockchain - ICBC 2022 : 5th international conference, held as part of the services conference federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, proceedings / / edited by Shiping Chen, Rudrapatna K. Shyamasundar, and Liang-Jie Zhang
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (155 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computational intelligence
Computer security
ISBN 3-031-23495-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Services Society -- Services Conference Federation (SCF) -- Contents -- Research Track -- Insights on Impact of Distributed Ledgers on Provider Networks -- 1 Introduction -- 2 Communication in a DLT -- 2.1 DLT Interactions -- 2.2 Resulting Communication Patterns -- 3 Challenges for Users and Provider Networks -- 4 Experimental Insights -- 4.1 Topological Measurements -- 4.2 Types of DLT Peers -- 4.3 Costs for Pool Establishment and Maintenance -- 5 Discussion -- 6 Conclusion -- References -- Legal Service Delivery and Support for the DAO Ecosystem -- 1 Introduction -- 2 Current State of Centralized Legal Systems -- 3 Growth of Decentralized Autonomous Organizations (DAOs) -- 4 Need for New Legal Applications for the DAO Development Community -- 4.1 Legal System Reform DAO -- 4.2 Dispute Resolution DAOs -- 4.3 Legal Wrappers and Legal Support DAO for DAOs -- 5 Conclusion -- References -- i-Bond: A Next Generation Bond's Issuing Service System -- 1 Introduction -- 2 Requirement Analysis -- 2.1 Traditional Bond Market -- 2.2 Limitations on Traditional Bond Issuance Process -- 2.3 Requirement Specifications -- 3 Architecture Design -- 3.1 Data Layer -- 3.2 Business Layer -- 3.3 Presentation Layer and User Layer -- 3.4 System Flow Design -- 3.5 Model Design -- 4 Issuance Mechanism and Auction Algorithm Design -- 4.1 Market Participants -- 4.2 Bidding and Issuance Mechanism -- 5 Tests and Analysis -- 6 Related Work -- 6.1 Credit Analysis Research -- 6.2 Issuer Information Disclosure -- 6.3 The Application of Smart Bond Contracts -- 6.4 Industry Practices -- 7 Conclusion and Future Work -- References -- A UI/UX Evaluation Framework for Blockchain-Based Applications -- 1 Introduction -- 2 Related Works -- 2.1 Limitation and Challenges -- 3 Proposed Framework -- 3.1 Mapping.
3.2 Adopting Design Patterns and UI Elements -- 3.3 Developing Guidelines -- 3.4 Identifying User Groups -- 4 Experimental Setup -- 5 Evaluation of the Proposed Framework on Blockchain-Based Application -- 5.1 Mapping -- 5.2 Adopting Design Patterns and UI Elements -- 5.3 Identifying User Groups -- 6 Recommendations -- 7 Conclusion -- References -- From Business-Level Specifications to Smart Contracts for Blockchain-Based Resource-Exchange Systems -- 1 Introduction -- 2 Related Work -- 3 Framework -- 4 Generation of Smart Contracts -- 4.1 Mapping Between User Concepts and Blockchain Concepts -- 4.2 Generated Smart Contracts -- 4.3 Examples -- 5 Discussion and Limitations -- 6 Conclusion -- References -- A Community Detection-Based Blockchain Sharding Scheme -- 1 Introduction -- 2 Related Work -- 3 Proposed Community Detection-Based Sharding Scheme -- 4 Experiments -- 4.1 Experiment Settings -- 4.2 Data Overview -- 4.3 Sharding Analysis -- 5 Conclusion -- References -- A Framework of Runtime Monitoring for Correct Execution of Smart Contracts -- 1 Introduction -- 2 An Overview of Vulnerabilities in Smart Contracts -- 2.1 Overcoming Smart Contract Exploits: A Brief Survey -- 3 Runtime Monitoring Framework: A Rationale -- 4 Run-Time Monitors to Prevent Unintended Execution Traces -- 4.1 Attacks Due to Re-entrancy Vulnerability -- 4.2 Mitigation for Attack1 on SimpleDAO -- 4.3 Mitigation for Attack2 on SimpleDAO -- 5 Run-Time Monitoring to Control Execution Traces -- 5.1 Transaction Order Nondeterminism Issue -- 5.2 Overcoming Transaction Order Dependency -- 5.3 ERC20 Token Standard and Issues of Nondeterminism -- 6 Realizing Run-Time Monitors Through Annotations -- 6.1 Annotations for Solidity Contracts and Standard Annotations -- 6.2 Specification of Annotations -- 6.3 Generating Run-Time Monitors from Standard Annotations.
6.4 Declarations in a Shared Variable Programming Language -- 7 A Comparative Discussion -- 8 Conclusions -- References -- Optimized Transaction Processing in Lightweight Distributed Ledger Networks for Internet of Things -- 1 Introduction -- 2 Related Work -- 3 System Design and Implementation -- 3.1 Graph Theoretical Description of Tango's DAG -- 3.2 PITEC Model Basics -- 3.3 Formulas to be Used in Future Physical Experimental Setup -- 4 Proposed Future Work -- 4.1 Network Implementation -- 5 Conclusion -- References -- Short Paper Track -- Shackled: A 3D Rendering Engine Programmed Entirely in Ethereum Smart Contracts -- 1 Introduction -- 2 Related Work -- 3 Datasets -- 4 Approach -- 4.1 Development -- 4.2 Design of the Rendering Pipeline -- 4.3 Deployment -- 5 Results and Discussion -- 5.1 Computation Scales Quadratically with Canvas Size -- 5.2 Computation Scales Linearly with the Number of Triangles Rendered -- 5.3 Backface Culling Reduces Computation Significantly -- 6 Conclusion and Future Work -- A Environmental Considerations -- B Data Availability and Reproducibility -- References -- Author Index.
Record Nr. UNISA-996503468303316
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Blockchain - ICBC 2022 : 5th international conference, held as part of the services conference federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, proceedings / / edited by Shiping Chen, Rudrapatna K. Shyamasundar, and Liang-Jie Zhang
Blockchain - ICBC 2022 : 5th international conference, held as part of the services conference federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, proceedings / / edited by Shiping Chen, Rudrapatna K. Shyamasundar, and Liang-Jie Zhang
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (155 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computational intelligence
Computer security
ISBN 3-031-23495-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Services Society -- Services Conference Federation (SCF) -- Contents -- Research Track -- Insights on Impact of Distributed Ledgers on Provider Networks -- 1 Introduction -- 2 Communication in a DLT -- 2.1 DLT Interactions -- 2.2 Resulting Communication Patterns -- 3 Challenges for Users and Provider Networks -- 4 Experimental Insights -- 4.1 Topological Measurements -- 4.2 Types of DLT Peers -- 4.3 Costs for Pool Establishment and Maintenance -- 5 Discussion -- 6 Conclusion -- References -- Legal Service Delivery and Support for the DAO Ecosystem -- 1 Introduction -- 2 Current State of Centralized Legal Systems -- 3 Growth of Decentralized Autonomous Organizations (DAOs) -- 4 Need for New Legal Applications for the DAO Development Community -- 4.1 Legal System Reform DAO -- 4.2 Dispute Resolution DAOs -- 4.3 Legal Wrappers and Legal Support DAO for DAOs -- 5 Conclusion -- References -- i-Bond: A Next Generation Bond's Issuing Service System -- 1 Introduction -- 2 Requirement Analysis -- 2.1 Traditional Bond Market -- 2.2 Limitations on Traditional Bond Issuance Process -- 2.3 Requirement Specifications -- 3 Architecture Design -- 3.1 Data Layer -- 3.2 Business Layer -- 3.3 Presentation Layer and User Layer -- 3.4 System Flow Design -- 3.5 Model Design -- 4 Issuance Mechanism and Auction Algorithm Design -- 4.1 Market Participants -- 4.2 Bidding and Issuance Mechanism -- 5 Tests and Analysis -- 6 Related Work -- 6.1 Credit Analysis Research -- 6.2 Issuer Information Disclosure -- 6.3 The Application of Smart Bond Contracts -- 6.4 Industry Practices -- 7 Conclusion and Future Work -- References -- A UI/UX Evaluation Framework for Blockchain-Based Applications -- 1 Introduction -- 2 Related Works -- 2.1 Limitation and Challenges -- 3 Proposed Framework -- 3.1 Mapping.
3.2 Adopting Design Patterns and UI Elements -- 3.3 Developing Guidelines -- 3.4 Identifying User Groups -- 4 Experimental Setup -- 5 Evaluation of the Proposed Framework on Blockchain-Based Application -- 5.1 Mapping -- 5.2 Adopting Design Patterns and UI Elements -- 5.3 Identifying User Groups -- 6 Recommendations -- 7 Conclusion -- References -- From Business-Level Specifications to Smart Contracts for Blockchain-Based Resource-Exchange Systems -- 1 Introduction -- 2 Related Work -- 3 Framework -- 4 Generation of Smart Contracts -- 4.1 Mapping Between User Concepts and Blockchain Concepts -- 4.2 Generated Smart Contracts -- 4.3 Examples -- 5 Discussion and Limitations -- 6 Conclusion -- References -- A Community Detection-Based Blockchain Sharding Scheme -- 1 Introduction -- 2 Related Work -- 3 Proposed Community Detection-Based Sharding Scheme -- 4 Experiments -- 4.1 Experiment Settings -- 4.2 Data Overview -- 4.3 Sharding Analysis -- 5 Conclusion -- References -- A Framework of Runtime Monitoring for Correct Execution of Smart Contracts -- 1 Introduction -- 2 An Overview of Vulnerabilities in Smart Contracts -- 2.1 Overcoming Smart Contract Exploits: A Brief Survey -- 3 Runtime Monitoring Framework: A Rationale -- 4 Run-Time Monitors to Prevent Unintended Execution Traces -- 4.1 Attacks Due to Re-entrancy Vulnerability -- 4.2 Mitigation for Attack1 on SimpleDAO -- 4.3 Mitigation for Attack2 on SimpleDAO -- 5 Run-Time Monitoring to Control Execution Traces -- 5.1 Transaction Order Nondeterminism Issue -- 5.2 Overcoming Transaction Order Dependency -- 5.3 ERC20 Token Standard and Issues of Nondeterminism -- 6 Realizing Run-Time Monitors Through Annotations -- 6.1 Annotations for Solidity Contracts and Standard Annotations -- 6.2 Specification of Annotations -- 6.3 Generating Run-Time Monitors from Standard Annotations.
6.4 Declarations in a Shared Variable Programming Language -- 7 A Comparative Discussion -- 8 Conclusions -- References -- Optimized Transaction Processing in Lightweight Distributed Ledger Networks for Internet of Things -- 1 Introduction -- 2 Related Work -- 3 System Design and Implementation -- 3.1 Graph Theoretical Description of Tango's DAG -- 3.2 PITEC Model Basics -- 3.3 Formulas to be Used in Future Physical Experimental Setup -- 4 Proposed Future Work -- 4.1 Network Implementation -- 5 Conclusion -- References -- Short Paper Track -- Shackled: A 3D Rendering Engine Programmed Entirely in Ethereum Smart Contracts -- 1 Introduction -- 2 Related Work -- 3 Datasets -- 4 Approach -- 4.1 Development -- 4.2 Design of the Rendering Pipeline -- 4.3 Deployment -- 5 Results and Discussion -- 5.1 Computation Scales Quadratically with Canvas Size -- 5.2 Computation Scales Linearly with the Number of Triangles Rendered -- 5.3 Backface Culling Reduces Computation Significantly -- 6 Conclusion and Future Work -- A Environmental Considerations -- B Data Availability and Reproducibility -- References -- Author Index.
Record Nr. UNINA-9910637737803321
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Systems Security : 19th International Conference, ICISS 2023, Raipur, India, December 16-20, 2023, Proceedings / / Vallipuram Muthukkumarasamy, Sithu D. Sudarsan, and Rudrapatna K. Shyamasundar, editors
Information Systems Security : 19th International Conference, ICISS 2023, Raipur, India, December 16-20, 2023, Proceedings / / Vallipuram Muthukkumarasamy, Sithu D. Sudarsan, and Rudrapatna K. Shyamasundar, editors
Edizione [First edition.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023]
Descrizione fisica 1 online resource (496 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science Series
Soggetto topico Computer security
Computers - Access control
ISBN 3-031-49099-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910770260603321
Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Systems Security : 19th International Conference, ICISS 2023, Raipur, India, December 16-20, 2023, Proceedings / / Vallipuram Muthukkumarasamy, Sithu D. Sudarsan, and Rudrapatna K. Shyamasundar, editors
Information Systems Security : 19th International Conference, ICISS 2023, Raipur, India, December 16-20, 2023, Proceedings / / Vallipuram Muthukkumarasamy, Sithu D. Sudarsan, and Rudrapatna K. Shyamasundar, editors
Edizione [First edition.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023]
Descrizione fisica 1 online resource (496 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science Series
Soggetto topico Computer security
Computers - Access control
ISBN 3-031-49099-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996574259403316
Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information systems security : 8th International Conference, ICISS 2022, Tirupati, India, December 16-20, 2022, proceedings / / edited by Venkata Ramana Badarla, Surya Nepal, and Rudrapatna K. Shyamasundar
Information systems security : 8th International Conference, ICISS 2022, Tirupati, India, December 16-20, 2022, proceedings / / edited by Venkata Ramana Badarla, Surya Nepal, and Rudrapatna K. Shyamasundar
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (297 pages)
Disciplina 016.391
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
ISBN 3-031-23690-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Abstracts of Keynote Addresses -- The Rise of Cyber Physical Security -- Research and Engineering Challenges of Blockchain and Web3 -- Security and Privacy in Federated Learning -- Web3 and the Interoperability of Asset Networks -- Abstracts of Invited Addresses -- Securing Cyber-Physical and IoT Systems in Smart Living Environments -- Advanced Persistent Threats: A Study in Indian Context -- Technology Transfer from Security Research Projects: A Personal Perspective -- Contents -- Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection -- 1 Introduction -- 2 Problem Description -- 3 Approach and Architecture -- 3.1 Tagged Provenance Graphs -- 3.2 Identifying Similar Nodes -- 3.3 Edge Label Similarity -- 3.4 Graph Similarity Detection -- 4 Evaluation -- 4.1 Ostinato Efficacy -- 4.2 Node Similarity Accuracy -- 4.3 Run-Time Performance -- 4.4 Threat Alert Fatigue Mitigation -- 4.5 Comparison with Other Tools -- 5 Related Work -- 6 Conclusion -- References -- DKS-PKI: A Distributed Key Server Architecture for Public Key Infrastructure -- 1 Introduction -- 2 Related Work -- 3 DKS-PKI Architecture -- 3.1 Overview -- 3.2 Node Operations -- 3.3 Authoritative Signing Keys (ASKs) -- 3.4 Certificate Registration/Issuance and Storage -- 3.5 Certificate Distribution -- 3.6 Certificate Revocation -- 3.7 Stored-Data Validation -- 4 Evaluation -- 4.1 Security Analysis -- 4.2 Implementation -- 4.3 Experimental Environment -- 4.4 Performance Analysis -- 5 Conclusion -- References -- Generating-Set Evaluation of Bloom Filter Hardening Techniques in Private Record Linkage -- 1 Introduction -- 2 Background and Related Work -- 2.1 Linkage with Bloom Filters -- 2.2 Hardening Bloom Filters -- 2.3 Privacy Measures -- 3 Generating-Sets and Amplification -- 3.1 Generating-Set Amplification Factor.
3.2 Amplification Factor in Deterministic Methods -- 3.3 Amplification Factor in Probabilistic Methods -- 4 Parameter Selection in Probabilistic Methods -- 5 Empirical Evaluation -- 5.1 Setup -- 5.2 Bit Frequency Measures -- 5.3 Generating-Set Amplification Factor -- 5.4 Linkage Quality -- 5.5 Discussion -- 6 Conclusion and Future Work -- References -- .26em plus .1em minus .1emSHIELD: A Multimodal Deep Learning Framework for Android Malware Detection -- 1 Introduction -- 2 Related Work -- 2.1 Static Analysis Based Android Malware Detection Techniques -- 2.2 Dynamic Analysis Based Android Malware Detection Techniques -- 2.3 Hybrid Analysis Based Android Malware Detection Techniques -- 3 SHIELD: The Proposed Framework -- 3.1 Feature Extraction -- 3.2 Markov Image Generation -- 3.3 Network Construction -- 4 Experimental Evaluation -- 4.1 Dataset -- 4.2 Evaluation Environment -- 4.3 Performance Analysis Based Markov Images Separately -- 4.4 Performance Analysis Based on Multimodal Latent Features -- 4.5 Unknown Malware Family Detection -- 4.6 Backdoor Analysis -- 4.7 Comparison with State-of-the-Art Work -- 5 Conclusion and Future Work -- References -- Samyukta: A Unified Access Control Model using Roles, Labels, and Attributes -- 1 Introduction -- 2 Related Work -- 3 Need for a Unified Model -- 4 Preliminaries -- 4.1 Readers-Writers Flow Model -- 5 Samyukta: A Unified Access Control Model -- 5.1 Formal Specification -- 5.2 Request Flow in Samyukta -- 5.3 Authorization Procedure -- 6 Effectiveness of Samyukta -- 6.1 Merits of Samyukta -- 7 Experimental Analysis -- 8 Conclusions -- References -- Efficient and Effective Static Android Malware Detection Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset Description -- 3.2 Feature Set -- 3.3 Machine Learning Classifier -- 3.4 Evaluation.
4 Comparison with Existing Approaches -- 5 Discussion -- 6 Conclusion and Future Work -- References -- Attacks on ML Systems: From Security Analysis to Attack Mitigation -- 1 Introduction -- 2 ML Systems and Attacks -- 2.1 ML Systems Have Three Main Perspectives -- 2.2 Adversarial Attacks -- 3 Security Analysis Requirements of ML Systems -- 3.1 ML System Security Analysis Requirements -- 3.2 Limitations of Prior Work on ML Security Analysis -- 4 Proposed Approach -- 4.1 The AI Security Causality Graph -- 4.2 The ML System Dependency Graph -- 4.3 Using the ML-SSA Approach to Analyze the Word Translation Attacks -- 5 AI Security Analysis and Attack Mitigation -- 5.1 Using the Example Word-to-Word Translation ML System to Illustrate Relevant Mitigation Strategies -- 6 Conclusion and Future Directions -- References -- MILSA: Model Interpretation Based Label Sniffing Attack in Federated Learning -- 1 Introduction -- 2 Background and Related Works -- 2.1 Federated Learning -- 2.2 Shapley Value -- 2.3 Inference Attacks -- 3 Threat Model -- 4 MILSA: The Proposed Attack -- 5 Experiments and Results -- 5.1 Experimental Setup -- 5.2 Results -- 6 The Proposed Defense -- 7 Conclusion -- References -- IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics -- 1 Introduction -- 2 Related Works -- 3 IoTInDet Methodology -- 3.1 Class Scatter Ratio Based Feature Selection -- 3.2 Hellinger Distance Chart Generation -- 3.3 IoT Normal Traffic Description -- 3.4 IoT Traffic Intrusion Detection -- 4 Experimental Results -- 5 Conclusion -- References -- Detecting Cloud Originated DDoS Attacks at the Source Using Out-Cloud Attack Detection (OCAD) -- 1 Introduction -- 2 Related Work -- 3 Cloud-Based DDoS Attacks -- 4 Out-Cloud Attack Cases in Cloud -- 4.1 An Attacker in the Cloud -- 4.2 A Reflector Server in the Cloud.
5 Out-Cloud Attack Detection (OCAD) -- 5.1 Traffic Directions -- 5.2 Virtual Interfaces vs Real Interfaces -- 5.3 Case 1: An Attacker in the Cloud -- 5.4 Case 2: A Reflector Server in the Cloud -- 5.5 OCAD Modules -- 6 Experimental Evaluation -- 6.1 Experimental Setup -- 6.2 Amplification Attack -- 6.3 Reflection Attack -- 6.4 Experimental Results -- 7 Discussion -- 8 Conclusions -- References -- Mining Attribute-Based Access Control Policies -- 1 Introduction -- 2 Overview of ABAC -- 3 Related Work -- 4 ABAC Policy Extraction -- 4.1 Policy Mining -- 4.2 Policy Extraction Using Machine Learning -- 5 Experimental Evaluation -- 5.1 Performance of Policy Mining Approach -- 5.2 Performance of ABAC Policies with Constraints -- 5.3 Performance of Policy Extraction Using Machine Learning -- 6 Conclusion -- References -- Preventing Privacy-Violating Information Flows in JavaScript Applications Using Dynamic Labelling -- 1 Introduction -- 2 Background -- 2.1 A Brief Introduction to IFC -- 2.2 Dynamic Labelling (DL) Algorithm ch12secrypt18,ch12ghosal2018compile -- 2.3 Readers-Writers Flow Model (RWFM) ch12kumar2017complete -- 3 Security Challenges and Our Approach -- 3.1 Flow Sensitivity -- 3.2 Termination Sensitivity -- 3.3 Eval Statement -- 3.4 Declassification -- 4 Solution for Preventing Privacy-Violating Flows -- 5 Related Work -- 6 Conclusions and Future Work -- References -- On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems -- 1 Introduction -- 2 Background and Related Work -- 2.1 Demand Manipulation Attacks -- 2.2 Anomaly Detection Mechanism -- 2.3 Related Work -- 3 Methodology -- 3.1 Power Consumption Data -- 3.2 Model Training -- 3.3 Anomaly Score -- 3.4 Thresholding Mechanism -- 3.5 Attack Profiles -- 4 Threshold Selection -- 4.1 The Threshold Dilemma -- 5 Model Tolerance and Impact -- 6 Conclusion and Future Work.
References -- WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 3.1 Saturation Attack Detection -- 3.2 Attack Mitigation -- 4 Experiments and Evaluation -- 5 Conclusion -- References -- WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 4 Implementation and Evaluation -- 4.1 System Setup -- 4.2 Evaluation -- 4.3 Measurement Study -- 4.4 Comparison with Existing Tools -- 5 Conclusion -- References -- WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and Detection -- 1 Introduction -- 2 Impact Study -- 3 Detecting Attacks -- 4 Experiments and Evaluation -- 5 Conclusion -- References -- Author Index.
Record Nr. UNINA-9910634049003321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information systems security : 8th International Conference, ICISS 2022, Tirupati, India, December 16-20, 2022, proceedings / / edited by Venkata Ramana Badarla, Surya Nepal, and Rudrapatna K. Shyamasundar
Information systems security : 8th International Conference, ICISS 2022, Tirupati, India, December 16-20, 2022, proceedings / / edited by Venkata Ramana Badarla, Surya Nepal, and Rudrapatna K. Shyamasundar
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (297 pages)
Disciplina 016.391
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
ISBN 3-031-23690-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Abstracts of Keynote Addresses -- The Rise of Cyber Physical Security -- Research and Engineering Challenges of Blockchain and Web3 -- Security and Privacy in Federated Learning -- Web3 and the Interoperability of Asset Networks -- Abstracts of Invited Addresses -- Securing Cyber-Physical and IoT Systems in Smart Living Environments -- Advanced Persistent Threats: A Study in Indian Context -- Technology Transfer from Security Research Projects: A Personal Perspective -- Contents -- Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection -- 1 Introduction -- 2 Problem Description -- 3 Approach and Architecture -- 3.1 Tagged Provenance Graphs -- 3.2 Identifying Similar Nodes -- 3.3 Edge Label Similarity -- 3.4 Graph Similarity Detection -- 4 Evaluation -- 4.1 Ostinato Efficacy -- 4.2 Node Similarity Accuracy -- 4.3 Run-Time Performance -- 4.4 Threat Alert Fatigue Mitigation -- 4.5 Comparison with Other Tools -- 5 Related Work -- 6 Conclusion -- References -- DKS-PKI: A Distributed Key Server Architecture for Public Key Infrastructure -- 1 Introduction -- 2 Related Work -- 3 DKS-PKI Architecture -- 3.1 Overview -- 3.2 Node Operations -- 3.3 Authoritative Signing Keys (ASKs) -- 3.4 Certificate Registration/Issuance and Storage -- 3.5 Certificate Distribution -- 3.6 Certificate Revocation -- 3.7 Stored-Data Validation -- 4 Evaluation -- 4.1 Security Analysis -- 4.2 Implementation -- 4.3 Experimental Environment -- 4.4 Performance Analysis -- 5 Conclusion -- References -- Generating-Set Evaluation of Bloom Filter Hardening Techniques in Private Record Linkage -- 1 Introduction -- 2 Background and Related Work -- 2.1 Linkage with Bloom Filters -- 2.2 Hardening Bloom Filters -- 2.3 Privacy Measures -- 3 Generating-Sets and Amplification -- 3.1 Generating-Set Amplification Factor.
3.2 Amplification Factor in Deterministic Methods -- 3.3 Amplification Factor in Probabilistic Methods -- 4 Parameter Selection in Probabilistic Methods -- 5 Empirical Evaluation -- 5.1 Setup -- 5.2 Bit Frequency Measures -- 5.3 Generating-Set Amplification Factor -- 5.4 Linkage Quality -- 5.5 Discussion -- 6 Conclusion and Future Work -- References -- .26em plus .1em minus .1emSHIELD: A Multimodal Deep Learning Framework for Android Malware Detection -- 1 Introduction -- 2 Related Work -- 2.1 Static Analysis Based Android Malware Detection Techniques -- 2.2 Dynamic Analysis Based Android Malware Detection Techniques -- 2.3 Hybrid Analysis Based Android Malware Detection Techniques -- 3 SHIELD: The Proposed Framework -- 3.1 Feature Extraction -- 3.2 Markov Image Generation -- 3.3 Network Construction -- 4 Experimental Evaluation -- 4.1 Dataset -- 4.2 Evaluation Environment -- 4.3 Performance Analysis Based Markov Images Separately -- 4.4 Performance Analysis Based on Multimodal Latent Features -- 4.5 Unknown Malware Family Detection -- 4.6 Backdoor Analysis -- 4.7 Comparison with State-of-the-Art Work -- 5 Conclusion and Future Work -- References -- Samyukta: A Unified Access Control Model using Roles, Labels, and Attributes -- 1 Introduction -- 2 Related Work -- 3 Need for a Unified Model -- 4 Preliminaries -- 4.1 Readers-Writers Flow Model -- 5 Samyukta: A Unified Access Control Model -- 5.1 Formal Specification -- 5.2 Request Flow in Samyukta -- 5.3 Authorization Procedure -- 6 Effectiveness of Samyukta -- 6.1 Merits of Samyukta -- 7 Experimental Analysis -- 8 Conclusions -- References -- Efficient and Effective Static Android Malware Detection Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset Description -- 3.2 Feature Set -- 3.3 Machine Learning Classifier -- 3.4 Evaluation.
4 Comparison with Existing Approaches -- 5 Discussion -- 6 Conclusion and Future Work -- References -- Attacks on ML Systems: From Security Analysis to Attack Mitigation -- 1 Introduction -- 2 ML Systems and Attacks -- 2.1 ML Systems Have Three Main Perspectives -- 2.2 Adversarial Attacks -- 3 Security Analysis Requirements of ML Systems -- 3.1 ML System Security Analysis Requirements -- 3.2 Limitations of Prior Work on ML Security Analysis -- 4 Proposed Approach -- 4.1 The AI Security Causality Graph -- 4.2 The ML System Dependency Graph -- 4.3 Using the ML-SSA Approach to Analyze the Word Translation Attacks -- 5 AI Security Analysis and Attack Mitigation -- 5.1 Using the Example Word-to-Word Translation ML System to Illustrate Relevant Mitigation Strategies -- 6 Conclusion and Future Directions -- References -- MILSA: Model Interpretation Based Label Sniffing Attack in Federated Learning -- 1 Introduction -- 2 Background and Related Works -- 2.1 Federated Learning -- 2.2 Shapley Value -- 2.3 Inference Attacks -- 3 Threat Model -- 4 MILSA: The Proposed Attack -- 5 Experiments and Results -- 5.1 Experimental Setup -- 5.2 Results -- 6 The Proposed Defense -- 7 Conclusion -- References -- IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics -- 1 Introduction -- 2 Related Works -- 3 IoTInDet Methodology -- 3.1 Class Scatter Ratio Based Feature Selection -- 3.2 Hellinger Distance Chart Generation -- 3.3 IoT Normal Traffic Description -- 3.4 IoT Traffic Intrusion Detection -- 4 Experimental Results -- 5 Conclusion -- References -- Detecting Cloud Originated DDoS Attacks at the Source Using Out-Cloud Attack Detection (OCAD) -- 1 Introduction -- 2 Related Work -- 3 Cloud-Based DDoS Attacks -- 4 Out-Cloud Attack Cases in Cloud -- 4.1 An Attacker in the Cloud -- 4.2 A Reflector Server in the Cloud.
5 Out-Cloud Attack Detection (OCAD) -- 5.1 Traffic Directions -- 5.2 Virtual Interfaces vs Real Interfaces -- 5.3 Case 1: An Attacker in the Cloud -- 5.4 Case 2: A Reflector Server in the Cloud -- 5.5 OCAD Modules -- 6 Experimental Evaluation -- 6.1 Experimental Setup -- 6.2 Amplification Attack -- 6.3 Reflection Attack -- 6.4 Experimental Results -- 7 Discussion -- 8 Conclusions -- References -- Mining Attribute-Based Access Control Policies -- 1 Introduction -- 2 Overview of ABAC -- 3 Related Work -- 4 ABAC Policy Extraction -- 4.1 Policy Mining -- 4.2 Policy Extraction Using Machine Learning -- 5 Experimental Evaluation -- 5.1 Performance of Policy Mining Approach -- 5.2 Performance of ABAC Policies with Constraints -- 5.3 Performance of Policy Extraction Using Machine Learning -- 6 Conclusion -- References -- Preventing Privacy-Violating Information Flows in JavaScript Applications Using Dynamic Labelling -- 1 Introduction -- 2 Background -- 2.1 A Brief Introduction to IFC -- 2.2 Dynamic Labelling (DL) Algorithm ch12secrypt18,ch12ghosal2018compile -- 2.3 Readers-Writers Flow Model (RWFM) ch12kumar2017complete -- 3 Security Challenges and Our Approach -- 3.1 Flow Sensitivity -- 3.2 Termination Sensitivity -- 3.3 Eval Statement -- 3.4 Declassification -- 4 Solution for Preventing Privacy-Violating Flows -- 5 Related Work -- 6 Conclusions and Future Work -- References -- On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems -- 1 Introduction -- 2 Background and Related Work -- 2.1 Demand Manipulation Attacks -- 2.2 Anomaly Detection Mechanism -- 2.3 Related Work -- 3 Methodology -- 3.1 Power Consumption Data -- 3.2 Model Training -- 3.3 Anomaly Score -- 3.4 Thresholding Mechanism -- 3.5 Attack Profiles -- 4 Threshold Selection -- 4.1 The Threshold Dilemma -- 5 Model Tolerance and Impact -- 6 Conclusion and Future Work.
References -- WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 3.1 Saturation Attack Detection -- 3.2 Attack Mitigation -- 4 Experiments and Evaluation -- 5 Conclusion -- References -- WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 4 Implementation and Evaluation -- 4.1 System Setup -- 4.2 Evaluation -- 4.3 Measurement Study -- 4.4 Comparison with Existing Tools -- 5 Conclusion -- References -- WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and Detection -- 1 Introduction -- 2 Impact Study -- 3 Detecting Attacks -- 4 Experiments and Evaluation -- 5 Conclusion -- References -- Author Index.
Record Nr. UNISA-996503470303316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information systems security : 17th international conference, ICISS 2021, Patna, India, December 16-20, 2021 : proceedings / / Somanath Tripathy, Rudrapatna K. Shyamasundar, Rajiv Ranjan, editors
Information systems security : 17th international conference, ICISS 2021, Patna, India, December 16-20, 2021 : proceedings / / Somanath Tripathy, Rudrapatna K. Shyamasundar, Rajiv Ranjan, editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer International Publishing, , [2021]
Descrizione fisica 1 online resource (250 pages)
Disciplina 004.6
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Access control
Computer security
ISBN 3-030-92571-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464440503316
Cham, Switzerland : , : Springer International Publishing, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information systems security : 17th international conference, ICISS 2021, Patna, India, December 16-20, 2021 : proceedings / / Somanath Tripathy, Rudrapatna K. Shyamasundar, Rajiv Ranjan, editors
Information systems security : 17th international conference, ICISS 2021, Patna, India, December 16-20, 2021 : proceedings / / Somanath Tripathy, Rudrapatna K. Shyamasundar, Rajiv Ranjan, editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer International Publishing, , [2021]
Descrizione fisica 1 online resource (250 pages)
Disciplina 004.6
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Access control
Computer security
ISBN 3-030-92571-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910513580603321
Cham, Switzerland : , : Springer International Publishing, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui