Java Project 2014-15

advertisement
A System for Denial-of-Service Attack Detection Based on
Multivariate Correlation Analysis
ABSTRACT:
Interconnected systems, such as Web servers, database servers, cloud
computing servers etc, are now under threads from network attackers. As one of
most common and aggressive means, Denial-of-Service (DoS) attacks cause
serious impact on these computing systems. In this paper, we present a DoS attack
detection system that uses Multivariate Correlation Analysis (MCA) for accurate
network traffic characterization by extracting the geometrical correlations between
network traffic features. Our MCA-based DoS attack detection system employs the
principle of anomaly-based detection in attack recognition. This makes our
solution capable of detecting known and unknown DoS attacks effectively by
learning the patterns of legitimate network traffic only. Furthermore, a trianglearea-based technique is proposed to enhance and to speed up the process of MCA.
The effectiveness of our proposed detection system is evaluated using KDD Cup
99 dataset, and the influences of both non-normalized data and normalized data on
the performance of the proposed detection system are examined. The results show
that our system outperforms two other previously developed state-of-the-art
approaches in terms of detection accuracy.
Building Confidential and Efficient Query
Services in the Cloud with RASP Data
Perturbation
ABSTRACT
With the wide deployment of public cloud computing infrastructures, using clouds to host
data query services has become an appealing solution for the advantages on scalability and costsaving. However, some data might be sensitive that the data owner does not want to move to the
cloud unless the data confidentiality and query privacy are guaranteed. On the other hand, a
secured query service should still provide efficient query processing and significantly reduce the
in-house workload to fully realize the benefits of cloud computing. We propose the RASP data
perturbation method to provide secure and efficient range query and kNN query services for
protected data in the cloud. The RASP data perturbation method combines order preserving
encryption, dimensionality expansion, random noise injection, and random projection, to provide
strong resilience to attacks on the perturbed data and queries. It also preserves multidimensional
ranges, which allows existing indexing techniques to be applied to speedup range query
processing. The kNN-R algorithm is designed to work with the RASP range query algorithm to
process the kNN queries. We have carefully analyzed the attacks on data and queries under a
precisely defined threat model and realistic security assumptions. Extensive experiments have
been conducted to show the advantages of this approach on efficiency and security.
Captcha as Graphical Passwords—A New Security
Primitive Based on Hard AI Problems
ABSTRACT
Many security primitives are based on hard mathematical problems. Using
hard AI problems for security is emerging as an exciting new paradigm, but has
been underexplored. In this paper, we present a new security primitive based on
hard AI problems, namely, a novel family of graphical password systems built on
top of Captcha technology, which we call Captcha as graphical passwords (CaRP).
CaRP is both a Captcha and a graphical password scheme. CaRP addresses a
number of security problems altogether, such as online guessing attacks, relay
attacks, and, if combined with dual-view technologies, shoulder-surfing attacks.
Notably, a CaRP password can be found only probabilistically by automatic online
guessing attacks even if the password is in the search set. CaRP also offers a novel
approach to address the well-known image hotspot problem in popular graphical
password systems, such as PassPoints, that often leads to weak password choices.
CaRP is not a panacea, but it offers reasonable security and usability and appears
to fit well with some practical applications for improving online security.
Dealing With Concept Drifts in Process Mining
ABSTRACT
Although most business processes change over time, contemporary process mining techniques tend to
analyze these processes as if they are in steady-state. Processes may change suddenly or gradually. The
drift may be periodic (e.g. due to seasonal influences) or one-of-a- kind (e.g., the effects of new
legislation). For process management it is
crucial to discover and understand such concept drifts in processes.
EXISTING SYSTEM:
The process is stable and enough example traces have been recorded in the event log, it
is possible to discover a high quality process model that can be used for performance analysis,
compliance checking, and prediction. Unfortunately, most processes are not in steady-state. In today's
dynamic marketplace, it is increasingly necessary for enterprises to streamline their processes so as to
reduce costs and to improve performance.
PROPOSED SYSTEM:
The proposed four features characterizing the control flow dependencies between activities. These
features are shown to be effective in detecting process changes. An event log can be transformed into a
data set D, which can be considered as a time series by these features. Change detection is done by
considering a series of successive populations1 of feature values and investigating if there is a significant
difference between two successive populations. The premise is that differences are expected to be
perceived at change points provided appropriate characteristics of the change are captured as features.
Decentralized Access Control with Anonymous
Authentication of Data Stored in Clouds
ABSTRACT
We propose a new decentralized access control scheme for secure data storage in clouds,
that supports anonymous authentication. In the proposed scheme, the cloud verifies the
authenticity of the ser without knowing the user’s identity before storing data. Our scheme also
has the added feature of access control in which only valid users are able to decrypt the stored
information. The scheme prevents replay attacks and supports creation, modification, and
reading data stored in the cloud. We also address user revocation. Moreover, our authentication
and access control scheme is decentralized and robust, unlike other access control schemes
designed for clouds which are centralized. The communication, computation, and storage
overheads are comparable to centralized approaches.
Key-Aggregate Cryptosystem
for Scalable Data Sharing in Cloud Storage
ABSTRACT
Data sharing is an important functionality in cloud storage. In this article, we show how
to securely, efficiently, and flexibly share data with others in cloud storage. We describe new
public-key cryptosystems which produce constant-size ciphertexts such that efficient delegation
of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate
any set of secret keys and make them as compact as a single key, but encompassing the power of
all the keys being aggregated. In other words, the secret key holder can release a constant-size
aggregate key for flexible choices of ciphertext set in cloud storage, but the other encrypted files
outside the set remain confidential. This compact aggregate key can be conveniently sent to
others or be stored in a smart card with very limited secure storage. We provide formal security
analysis of our schemes in the standard model. We also describe other application of our
schemes. In particular, our schemes give the first public-key patient-controlled encryption for
flexible hierarchy, which was yet to be known.
Oruta: Privacy-Preserving Public Auditing
for Shared Data in the Cloud
Abstract:
With cloud storage services, it is commonplace for data to
be not only stored in the cloud, but also shared across multiple users.
However, public auditing for such shared data— while preserving
identity privacy — remains to be an open challenge. In this paper, we
propose the first privacy-preserving mechanism that allows public
auditing on shared data stored in the cloud. In particular, we exploit
ring signatures to compute the verification information needed to audit
the integrity of shared data. With our mechanism, the identity of the
signer on each block in shared data is kept private from a third party
auditor (TPA), who is still able to verify the integrity of shared data
without retrieving the entire file. Our experimental results demonstrate
the effectiveness and efficiency of our proposed mechanism when
auditing shared data.
Secure Outsourced Attribute-Based Signatures
ABSTRACT
Attribute-based signature (ABS) is a useful variant of digital signature, which enables users to
sign messages over attributes without revealing any information other than the fact that they
have attested to the messages. However, heavy computational cost is required during signing in
existing work of ABS, which grows linearly with the size of the predicate formula. As a result,
this presents a significant challenge for resource-limited users (such as mobile devices) to
perform such heavy computation independently. Aiming at tackling the challenge above, we
propose and formalize a new paradigm called OABS, in which the computational overhead at
user side is greatly reduced through outsourcing such intensive computation to an un trusted
signing-cloud service provider (S-CSP). Furthermore, we apply this novel paradigm to existing
ABS to reduce complexity and present two schemes, i) in the first OABS scheme, the number of
exponentiations involving in signing is reduced from O(d) to O(1) (nearly three), where d is the
upper bound of threshold value defined in the predicate; ii) our second scheme is built on
Herranz et al's construction with constant-size signatures. The number of exponentiations in
signing is reduced from O(d2) to O(d) and the communication overhead is O(1). Security
analysis demonstrates that both OABS schemes are secure in terms of the unforgeability and
attribute- signer privacy definitions specified in the proposed security model. Finally, to allow
for high efficiency and exibility, we discuss extensions of OABS and show how to achieve
accountability and outsourced verification as well.
Securing Brokerless Publish/Subscribe Systems
Using Identity Based Encryption
ABSTRACT
The provisioning of basic security mechanisms such as authentication and confidentiality is
highly challenging in a content based publish/subscribe system. Authentication of publishers
and subscribers is difficult to achieve due to the loose coupling of publishers and subscribers.
Likewise, confidentiality of events and subscriptions conflicts with content-based routing. This
paper presents a novel approach to provide confidentiality and authentication in a broker-less
content-based publish/subscribe system. The authentication of publishers and subscribers as
well as confidentiality of events is ensured, by adapting the pairing-based cryptography
mechanisms, to the needs of a publish/subscribe system. Furthermore, an algorithm to cluster
subscribers according to their subscriptions preserves a weak notion of subscription
confidentiality. In addition to our previous work this paper contributes 1) use of searchable
encryption to enable efficient routing of encrypted events, 2) multicredential routing a new
event dissemination strategy to strengthen the weak subscription confidentiality, and 3)
thorough analysis of different attacks on subscription confidentiality. The overall approach
provides fine-grained key management and the cost for encryption, decryption, and routing is
in the order of subscribed attributes. Moreover, the evaluations show that providing security is
affordable w.r.t. 1) throughput of the proposed cryptographic primitives, and 2) delays incurred
during the construction of the publish/subscribe overlay and the event dissemination.
Supporting Privacy Protection in Personalized
Web Search
ABSTRACT
Personalized web search (PWS) has demonstrated its effectiveness in improving the
quality of various search services on the Internet. However, evidences show that users’
reluctance to disclose their private information during search has become a major barrier for the
wide proliferation of PWS. We study privacy protection in PWS applications that model user
preferences as hierarchical user profiles. We propose a PWS framework called UPS that can
adaptively generalize profiles by queries while respecting userspecified privacy requirements.
Our runtime generalization aims at striking a balance between two predictive metrics that
evaluate the utility of personalization and the privacy risk of exposing the generalized profile.
We present two greedy algorithms, namely GreedyDP and GreedyIL, for runtime generalization.
We also provide an online prediction mechanism for deciding whether personalizing a query is
beneficial. Extensive experiments demonstrate the effectiveness of our framework. The
experimental results also reveal that GreedyIL significantly outperforms GreedyDP in terms of
efficiency.
CLOUD COMPUTING
1
2
A Privacy Leakage Upper Bound Constraint-Based Approach for CostEffective Privacy reserving of Intermediate Data Sets in Cloud
AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and
Efficient Social Video
Sharing in the Clouds
3
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
4
On Data Staging Algorithms for Shared Data Accesses in Clouds
5
Privacy-Preserving Public Auditing for Secure Cloud Storage
6
QoS Ranking Prediction for Cloud Services
7
Winds of Change: From Vendor Lock-In to the Meta Cloud
8
A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
2013
2013
2013
2013
2013
2013
2013
2013
9
10
Collaboration in Multi cloud Computing Environments: Framework
and Security Issues
Mining Contracts for Business Events and Temporal Constraints in Service
Engagements
2013
2013
11
Outsourcing Privacy-Preserving Social Networks to a Cloud
2013
12
Scalable and Secure Sharing of Personal Health Records in Cloud Computing
using Attribute-based Encryption
2013
13
Cloud data protection for masses (DPAAS)
2012
14
Costing of Cloud Computing Services: A Total Cost of Ownership Approach
2012
15
Efficient similarity search over encrypted data
2012
16
17
Enabling Secure and Efficient Ranked Keyword Search over Outsourced
Cloud Data
Ensuring Distributed Accountability for Data Sharing in the Cloud
2012
2012
Anchor: A Versatile and Efficient Framework for Resource Management in
18
2012
the Clouds
DATA MINING
1
Spatial Approximate String Search
2
A Survey of XML Tree Patterns
3
A Fast Clustering-Based Feature Subset Selection Algorithm for High
Dimensional Data
4
Optimal Route Queries with Arbitrary Order Constraints
5
Change Detection in Streaming Multivariate Data Using Likelihood Detectors
6
A Novel Profit Maximizing Metric for Measuring Classification Performance
of Customer Churn Prediction Models
7
Crowd sourcing Predictors of Behavioral Outcomes
8
Failure-Aware Cascaded Suppression in Wireless Sensor Networks
9
Mining User Queries with Markov Chains: Application to Online Image
Retrieval
10
m-Privacy for Collaborative Data Publishing
11
Privacy Preserving Delegated Access Control in Public Clouds
2013
2013
2013
2013
2013
2013
2013
2013
2013
2013
2013
12
T-Drive: Enhancing Driving Directions with Taxi Drivers’ Intelligence
2013
13
Relationships between Diversity of Classification Ensembles and Single-Class
Performance Measures
2013
14
Ranking on Data Manifold with Sink Points
2013
15
Sampling Online Social Networks
2013
16
17
18
19
20
21
22
Real-Time Implementation of the Vertex Component Analysis Algorithm on
GPUs
Estimating Information from Image Colors: An Application to Digital Cameras
and Natural Scenes
Facilitating Document Annotation Using Content And Querying Value
FOCUS Learning to Crawl Web Forums
Incentive Compatible Privacy-Preserving Data Analysis
PMSE A Personalized Mobile Search Engine
Secure Mining of Association Rules in Horizontally Distributed Databases
2013
2013
2013
2013
2013
2013
2013
23
A Link-Based Cluster Ensemble Approach for Categorical Data Clustering
2012
24
Answering General Time-Sensitive Queries
2012
25
Creating Evolving User Behavior Profiles Automatically
2012
26
Effective Pattern Discovery for Text Mining
2012
27
Incremental Information Extraction Using Relational Databases
2012
Mining Graph Topological Patterns: Finding Co-variations Among Vertex
28
2012
Descriptors
NET WORKING & NETWORK
SECURITY
1
2
3
A Rank Correlation Based Detection against Distributed Reflection DoS
Attacks
An Empirical Interference Modeling for Link Reliability Assessment in
Wireless Networks
Diffusion Dynamics of Network Technologies With Bounded Rational Users:
2013
2013
2013
4
5
6
7
8
Aspiration-Based Learning
Exploring the Design Space of Multichannel Peer-to-Peer Live Video
Streaming Systems
Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging
Quality
Modeling the Pair wise Key Pre distribution Scheme in the Presence of
Unreliable Links
Multiparty Access Control for Online Social Networks: Model and
Mechanisms
Optimizing Cloud Resources for Delivering IPTV Services Through
Virtualization
9
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
10
Participatory Privacy: Enabling Privacy in Participatory Sensing
11
Sink Trail: A Proactive Data Reporting Protocol for Wireless Sensor Networks
2013
2013
2013
2013
2013
2013
2013
2013
Importance of Coherence Protocols with Network Applications on Multi core
Processors
Detection and Localization of Multiple Spoofing Attackers in Wireless
Networks
2013
14
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
2013
15
Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication
Networks
2013
16
Delay-Based Network Utility Maximization
2013
17
Dynamic Control of Coding for Progressive Packet Arrivals in DTNs
2013
18
Fast Transmission to Remote Cooperative Groups A New Key Management
Paradigm
2013
19
Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols
2013
20
On the Node Clone Detection in Wireless Sensor Networks
2013
21
Opportunistic MANETs Mobility Can Make Up for Low Transmission Power
2013
12
13
23
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service
for High-Speed Networks
DRINA A Lightweight And Reliable Routing
24
Cut Detection In Wireless Sensor Network
22
2013
2013
2012
2012
SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework
25
26
for Mobile-Healthcare Emergency
AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing
2012
2012
Topologies
FireCol: A Collaborative Protection Network for the Detection of Flooding
27
2012
DDoS Attacks
The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile
28
2012
Sinks
MOBILE COMPUTING
1
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing
Overhead in Mobile Ad Hoc Networks
2
IP-Geo location Mapping for Moderately Connected Internet Regions
3
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
4
On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
5
Optimal Multicast Capacity and Delay Tradeoffs in MANETs
6
7
8
9
10
11
12
13
Optimizing Cloud Resources for Delivering IPTV Services Through
Virtualization
Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless
Sensor Networks
A Rank Correlation Based Detection against Distributed Reflection DoS
Attacks
Delay-Optimal Broadcast for Multi hop Wireless Networks Using SelfInterference Cancellation
A Scalable Server Architecture for Mobile Presence Services in Social
Network Applications
Community-Aware Opportunistic Routing in Mobile Social Networks
Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile
Social Networks
Search Me If You Can Privacy-preserving Location Query Service
2013
2013
2013
2013
2013
2013
2013
2013
2013
2013
2013
2013
2013
14
Self Adaptive Contention Aware Routing Protocol for Intermittently
Connected Mobile Networks
2013
15
Towards a Statistical Framework for Source Anonymity in Sensor Networks
2013
16
Vampire attacks Draining life from wireless ad-hoc sensor networks
2013
17
18
Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the
Number of Transmissions
Energy-Efficient Cooperative Video Distribution with Statistical QoS
Provisions over Wireless Networks
2012
2012
SECURE COMPUTING
1
2
3
4
5
6
Secure Encounter-based Mobile Social Networks: Requirements, Designs, and
Tradeoffs
Extracting Spread-Spectrum Hidden Data from Digital Media
TRPF A Trajectory Privacy-Preserving Framework for Participatory Sensing
Two tales of privacy in online social networks
Utility-Privacy Tradeoff in Databases An Information-theoretic Approach
Risk-Aware Mitigation for MANET Routing Attacks
2013
2013
2013
2013
2013
2012
Detecting Automation of Twitter Accounts: Are You a Human, Bot, or
7
8
Cyborg?
Detecting Spam Zombies by Monitoring Outgoing Messages
2012
2012
PARALLEL & DISTRIBUTED SYSTEMS
A Privacy Leakage Upper-bound Constraint based Approach for Costeffective Privacy Preserving of Intermediate Datasets in Cloud
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
2013
2013
6
A System for Denial-of-Service Attack Detection Based on Multivariate
Correlation Analysis
Dynamic Resource Allocation using Virtual Machines for Cloud Computing
Environment
Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing
Storage Systems
IP-Geo location Mapping for Moderately Connected Internet Regions
7
Load Rebalancing for Distributed File Systems in Clouds
2013
8
Optimal Client-Server Assignment for Internet Distributed Systems
2013
9
Optimal Multi server Configuration for Profit Maximization in Cloud
Computing
Security Analysis of a Privacy-Preserving Decentralized Key-Policy
2013
1
2
3
4
5
10
2013
2013
2013
2013
2013
11
Attribute-Based Encryption Scheme
Social Tube P2P-assisted Video Sharing in Online Social Networks
2013
12
Towards Differential Query Services in Cost-Efficient Clouds
2013
Download