DDoS attack detection with feature engineering and machine learning: the framework and performance evaluationAbstract
This paper applies an organized flow of feature engineering and machine learning to detect distributed denial-of-service (DDoS) attacks. Feature engineering has a focus to obtain the datasets of different dimensions with significant features, using feature selection methods of backward elimination, chi2, and information gain scores. Different supervised machine learning models are applied on the feature-engineered datasets to demonstrate the adaptability of datasets for machine learning under optimal tuning of parameters within given sets of values. The results show that substantial feature reduction is possible to make DDoS detection faster and optimized with minimal performance hit. The paper proposes a strategic-level framework which incorporates the necessary elements of feature engineering and machine learning with a defined flow of experimentation. The models are also validated with cross-validation and evaluated for area-under-curve analyses. It provides comprehensive solutions which can be trusted to avoid the overfitting and collinearity problems of data while detecting DDoS attacks. In the case study of DDoS datasets, K-nearest neighbors algorithm overall exhibits the best performance followed by support vector machine, whereas low-dimensional datasets of discrete feature types perform better under the Random Forest model as compared to high dimensions with numerical features. The accuracy scores of dataset with the lowest number of features remain competitive with other datasets under all machine learning models, leading to a substantially reduced processing overhead. The experiments show that approximately 68% reduction in the feature space is possible with an impact of only about 0.03% on accuracy.
|
DOMtegrity: ensuring web page integrity against malicious browser extensionsAbstract
In this paper, we address an unsolved problem in the real world: how to ensure the integrity of the web content in a browser in the presence of malicious browser extensions? The problem of exposing confidential user credentials to malicious extensions has been widely understood, which has prompted major banks to deploy two-factor authentication. However, the importance of the “integrity” of the web content has received little attention. We implement two attacks on real-world online banking websites and show that ignoring the “integrity” of the web content can fundamentally defeat two-factor solutions. To address this problem, we propose a cryptographic protocol called DOMtegrity to ensure the end-to-end integrity of the DOM structure of a web page from delivering at a web server to the rendering of the page in the user’s browser. DOMtegrity is the first solution that protects DOM integrity without modifying the browser architecture or requiring extra hardware. It works by exploiting subtle yet important differences between browser extensions and in-line JavaScript code. We show how DOMtegrity prevents the earlier attacks and a whole range of man-in-the-browser attacks. We conduct extensive experiments on more than 14,000 real-world extensions to evaluate the effectiveness of DOMtegrity.
|
Leveraging cyber threat intelligence for a dynamic risk frameworkAbstract
One of the most important goals in an organization is to have risks under an acceptance level along the time. All organizations are exposed to real-time security threats that could have an impact on their risk exposure levels harming the entire organization, their customers and their reputation. New emerging techniques, tactics and procedures (TTP) which remain undetected, the complexity and decentralization of organization assets, the great number of vulnerabilities proportional to the number of new type of devices (IoT) or still the high number of false positives, are only some examples of real risks for any organization. Risk management frameworks are not integrated and automated with near real-time (NRT) risk-related cybersecurity threat intelligence (CTI) information. The contribution of this paper is an integrated architecture based on the Web Ontology Language (OWL), a semantic reasoner and the use of Semantic Web Rule Language (SWRL) to approach a Dynamic Risk Assessment and Management (DRA/DRM) framework at all levels (operational, tactic and strategic). To enable such a dynamic, NRT and more realistic risk assessment and management processes, we created a new semantic version of STIX™v2.0 for cyber threat intelligence as it is becoming a de facto standard for structured threat information exchange. We selected an international leading organization in cybersecurity to demonstrate new dynamic ways to support decision making at all levels while being under attack. Semantic reasoners could be our ideal partners to fight against threats having risks under control along the time, for that, they need to understand the data. Our proposal uses an unprecedented mix of standards to cover all levels of a DRM and ensure easier adoption by users.
|
File Guard : automatic format-based media file sanitizationAbstract
This paper proposes a format-based file sanitization mechanism, File Guard, aiming at preventing software vulnerabilities from being triggered by input files. Based on our experiments and the statistics on Common Vulnerabilities and Exposures, we observed that most of the software vulnerabilities are exploited by malformed input files which violate their corresponding format standards. Hence, repairing the input file according to the format standard is effective in preventing the vulnerabilities from being exploited. In this work, we focus on media file types, such as image, audio, video. File Guard automatically sanitizes input files of known formats, disabling the files from triggering potential vulnerabilities in a target system (or a group of systems) with minimum data loss. Existing intrusion prevention systems and anti-virus tools typically compare the input file or executable with the ones which are known to be malicious, and eliminate such data or software before they get into the protected system. Instead of blocking the malicious or damaged input file, our mechanism repairs the data and provides a more user-friendly protection. File Guard can ensure that the input file meets its standard format and thus is not exploitable even by zero-day vulnerabilities.
|
Hydras and IPFS: a decentralised playground for malwareAbstract
Modern malware can take various forms and has reached a very high level of sophistication in terms of its penetration, persistence, communication and hiding capabilities. The use of cryptography, and of covert communication channels over public and widely used protocols and services, is becoming a norm. In this work, we start by introducing Resource Identifier Generation Algorithms. These are an extension of a well-known mechanism called domain generation algorithms, which are frequently employed by cybercriminals for bot management and communication. Our extension allows, beyond DNS, the use of other protocols. More concretely, we showcase the exploitation of the InterPlanetary File System (IPFS). This is a solution for the “permanent web”, which enjoys a steadily growing community interest and adoption. The IPFS is, in addition, one of the most prominent solutions for blockchain storage. We go beyond the straightforward case of using the IPFS for hosting malicious content and explore ways in which a botmaster could employ it, to manage her bots, validating our findings experimentally. Finally, we discuss the advantages of our approach for malware authors, its efficacy and highlight its extensibility for other distributed storage services.
|
Encouraging users to improve password security and memorabilityAbstract
Security issues in text-based password authentication are rarely caused by technical issues, but rather by the limitations of human memory, and human perceptions together with their consequential responses. This study introduces a new user-friendly guideline approach to password creation, including persuasive messages that motivate and influence users to select more secure and memorable text passwords without overburdening their memory. From a broad understanding of human factors-caused security problems, we offer a reliable solution by encouraging users to create their own formula to compose passwords. A study has been conducted to evaluate the efficiency of the proposed password guidelines. Its results suggest that the password creation methods and persuasive message provided to users convinced them to create cryptographically strong and memorable passwords. Participants were divided into two groups in the study. The participants in the experimental group who were given several password creation methods along with a persuasive message created more secure and memorable passwords than the participants in the control group who were asked to comply with the usual strict password creation rules. The study also suggests that our password creation methods are much more efficient than strict password policy rules. The security and usability evaluation of the proposed password guideline showed that simple improvements such as adding persuasive text to the usual password guidelines consisting of several password restriction rules make significant changes to the strength and memorability of passwords. The proposed password guidelines are a low-cost solution to the problem of improving the security and usability of text-based passwords.
|
Secure and trusted partial grey-box verificationAbstract
A crucial aspect in the development of software-intensive systems is verification. This is the process of checking whether the system has been implemented in compliance with its specification. In many situations, the manufacture of one or more components of the system is outsourced. We study the case of how a third party (the verifier) can verify an outsourced component effectively, without access to all the details of the internal design of that component built by the developer. We limit the design detail that is made available to the verifier to a diagram of interconnections between the different design units within the component, but encrypt the design details within the units and also the intermediate values passed between the design units. We formalize this notion of limited information using tabular expressions to describe the functions in both the specifications and the design. The most common form of verification is testing, and it is known that black-box testing of the component is not effective enough in deriving test cases that will adequately determine the correctness of the implementation, and the safety of its behaviour. We have developed protocols that allow for the derivation of test cases that take advantage of the design details disclosed as described above. We can regard this as partial grey-box testing that does not compromise the developer’s secret information. Our protocols work with both trusted and untrusted developers, as well as trusted and untrusted verifiers, and allow for the checking of the correctness of the verification process itself by any third party, and at any time. Currently our results are derived under the simplifying assumption that the software design units are linked acyclically. We leave the lifting of this assumption as an open problem for future research.
|
Understanding user passwords through password prefix and postfix (P3) graph analysis and visualizationAbstract
While other authentication methods exist, passwords are still the dominant way for user authentication and system security. Over the years, passwords have become long and complex thanks to security policy and awareness. However, the security of user passwords remains unclear. Therefore, understanding users passwords is vital to improve the strength of passwords and system security in general. In this paper, we investigate one specific pattern, i.e., the prefix and postfix of user passwords. To facilitate password prefix and postfix (P3) analysis, we propose both hierarchical segmentation / optimization algorithms and password prefix/postfix graphs (P3G) construction and P3G visualizations. Through case study over real-world user passwords, we demonstrate P3 analysis and visualization are effective in identifying unique patterns for different user categories. The results suggest strong correlations between prefix/postfix and their context in user passwords.
|
Repairing an aggregation-based smart metering systemAbstract
Smart meters inform the electricity suppliers about the consumption of their clients in short intervals. Fine-grained electricity consumption information is highly sensitive as it has been proven to permit to infer people’s habits, for instance, the time they leave or arrive home. Hence, appropriate measures have to be taken to preserve clients’ privacy in smart metering systems. In this paper, we first analyze a recent proposal by Busom et al. (Comput Commun 82:95–101, 2016) and show how a corrupted substation is able to get the individual reading of any arbitrarily chosen smart meter without requiring the collaboration of any other party. After that, we propose a way to fix the mentioned security flaw which is based on adding an additional step in which the substation proves that it has properly followed all the protocol steps. Our solution is analyzed and shown to be computationally feasible for realistic parameter choices.
|
Signature schemes with a fuzzy private keyAbstract
In this paper, we introduce a new concept of digital signature that we call fuzzy signature, which is a signature scheme that uses a noisy string such as biometric data as a private key, but does not require user-specific auxiliary data (which is also called a helper string in the context of fuzzy extractors), for generating a signature. Our technical contributions are threefold: (1) we first give the formal definition of fuzzy signature, together with a formal definition of a “setting” that specifies some necessary information for fuzzy data. (2) We give a generic construction of a fuzzy signature scheme based on a signature scheme that has certain homomorphic properties regarding keys and satisfies a kind of related key attack security with respect to addition, and a new tool that we call linear sketch. (3) We specify two concrete settings for fuzzy data, and for each of the settings give a concrete instantiation of these building blocks for our generic construction, leading to two concrete fuzzy signature schemes. We also discuss how fuzzy signature schemes can be used to realize a biometric-based PKI that uses biometric data itself as a cryptographic key, which we call the public biometric infrastructure.
|
Medicine by Alexandros G. Sfakianakis,Anapafseos 5 Agios Nikolaos 72100 Crete Greece,00302841026182,00306932607174,alsfakia@gmail.com,
Πληροφορίες
Ετικέτες
Κυριακή 22 Σεπτεμβρίου 2019
Αναρτήθηκε από
Medicine by Alexandros G. Sfakianakis,Anapafseos 5 Agios Nikolaos 72100 Crete Greece,00302841026182,00306932607174,alsfakia@gmail.com,
στις
11:57 μ.μ.
Ετικέτες
00302841026182,
00306932607174,
alsfakia@gmail.com,
Anapafseos 5 Agios Nikolaos 72100 Crete Greece,
Medicine by Alexandros G. Sfakianakis
Εγγραφή σε:
Σχόλια ανάρτησης (Atom)
Αρχειοθήκη ιστολογίου
-
►
2023
(276)
- ► Φεβρουαρίου (133)
- ► Ιανουαρίου (143)
-
►
2022
(1976)
- ► Δεκεμβρίου (116)
- ► Σεπτεμβρίου (158)
- ► Φεβρουαρίου (165)
- ► Ιανουαρίου (161)
-
►
2021
(3661)
- ► Δεκεμβρίου (161)
- ► Σεπτεμβρίου (274)
- ► Φεβρουαρίου (64)
- ► Ιανουαρίου (368)
-
►
2020
(4554)
- ► Δεκεμβρίου (400)
- ► Σεπτεμβρίου (381)
- ► Φεβρουαρίου (638)
- ► Ιανουαρίου (691)
-
▼
2019
(4999)
- ► Δεκεμβρίου (924)
-
▼
Σεπτεμβρίου
(845)
- Medicine by Alexandros G. Sfakianakis,Anapafseos 5...
- Journal of Cosmetic Dermatology,Early View ...
- Medicine by Alexandros G. Sfakianakis,Anapafseos 5...
- Clinical Anatomy
- Journal of Voice
- What causes increased passive stiffness of plant...
- Medicine by Alexandros G. Sfakianakis,Anapafseos 5...
- Foraging consistency of coral reef fishes across...
- International Journal of Environmental Research ...
- Incidence and Outcomes of Sepsis in Korea: A Nat...
- Mucinous cystadenoma of oral minor salivary gland...
- Follow-Up of an Implant-Supported Rehabilitation...
- Ebola virus disease: Recent advancs in diagnosti...
- Social determinants of mental health – Let's not...
- Observations of Distortion Product Otoacoustic E...
- A Survey of Current Procurement Travel Practices...
- Intracranial Electroencephalography in Pediatric...
- Effect of diabetes-specific nutrition formulas ...
- Australian Skin Cancer Genetic Study Seeks to R...
- Platelet‐rich plasma improves the therapeutic e...
- Timing of voiding cystourethrography after febri...
- Karpenisi is a town in central Greece. It is the c...
- Complications Associated With the Anesthesia Tra...
- AMEDEO Otorhinolaryngologyhttp://www.amedeo.comht...
- Oncology
- Formulation of survival acceptor medium able to...
- Asthma and the Weather: What's the Link? ...
- Laudation on Professor Roland Laszig Laudation o...
- Inhaltsverzeichnis BYE BYE MADEIRA MIT MUSIK QI-...
- Spinalkanalstenose Hot Topic: Wirbelsäule Die lu...
- Directory: AAO Officers and OrganizationsPublica...
- From the American Academy of Pediatrics, Pedi...
- Adult Traumatic Brachial Plexus InjuriesAdult tr...
- Elizabeth Barrett-Connor, 1935–2019, Talc, Asbes...
- Highlights of the November issue, Bibliometric a...
- Opportunities for Healthy Learning as a Social D...
- Prevalence and Impact on Mechanical Ventilation ...
- Evaluation of Renal Function Disorder With Urina...
- Service based comparison of group cognitive beha...
- No Fellow Left Behind, Graduating Fellows’ Proce...
- Development of a combined CMV-UL97 C592F and CMV...
- Dermatology,Early View Correspondence
- The Risk and Cost of Limited Clinician and Pat...
- Dermatology and Venereology,.Accepted Articles ...
- Has spectral-domain optical coherence tomography...
- Acute epididymo-orchitis due to Salmonella Typhi...
- Waist circumference or sarcopenic obesity; which...
- Oncology
- Otolaryngology–Head and Neck Surgery , ...
- Ear, Nose & Throat Journal ,
- Medicine by Alexandros G. Sfakianakis,Anapafseos 5...
- Medicine by Alexandros G. Sfakianakis,Anapafseos 5...
- Integrative Cancer Therapies are available onli...
- Clinical OtolaryngologyAccepted Articles Accep...
- JoVE: Journal of Visualized Experiments,
- Letter about outcome differences between recanal...
- Intramedulläre Button-Refixation der distalen Bi...
- Ammoniumbituminosulfonat Panorama Dermatologisch...
- Relating response shift and cognitive appraisal ...
- Allergy & RhinologyEarly View Online Version o...
- Occupational health in Pakistan: challenges and ...
- DermatologyEarly View Online Version of Record...
- DermatologyAccepted Articles Accepted, unedite...
- Clinical and Experimental DermatologyEarly View ...
- Clinical and Experimental DermatologyAccepted Ar...
- Medicine by Alexandros G. Sfakianakis,Anapafseos 5...
- Medicine by Alexandros G. Sfakianakis,Anapafseos 5...
- Medicine by Alexandros G. Sfakianakis,Anapafseos 5...
- Antibiotics, Vol. 8, Pages 167: Comparison o...
- Prevalence of Obstructive Sleep Apnea in Pat...
- Appendectomy in Third Trimester of Pregnancy...
- A patient with conventional and follicular v...
- World Neurosurgery
Δεν υπάρχουν σχόλια:
Δημοσίευση σχολίου