By Topic

2006 IEEE Information Assurance Workshop

21-23 June 2006

Filter Results

Displaying Results 1 - 25 of 65
  • Program Committee

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • Conference Committee

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Sessions at a Glance

    Publication Year: 2006, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2006, Page(s):vi - x
    Request permission for commercial reuse | PDF file iconPDF (156 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2006, Page(s):xi - xv
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Copyright

    Publication Year: 2006, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (337 KB)
    Freely Available from IEEE
  • Service oriented modeling of communication infastructure for assurance

    Publication Year: 2006, Page(s):1 - 8
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (493 KB) | HTML iconHTML

    To be able to achieve security assurance for services, which run on large and complex communication infrastructures, support tools are needed. Such tools need a representations of the infrastructure that enables and provides security assurance. In this paper we suggest an assurance modeling profile for UML 2.0. The profile contains stereotypes that define assurance-relevant object types as observe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing a Threat Model for Enterprise Storage Area Networks

    Publication Year: 2006, Page(s):9 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    The need for improved security has been widely recognized in the information technology industry, particularly for enterprise storage area networks (SANs). However, until recently there has been relatively little development of threat models which specifically address the unique requirements of these networks. In this paper, we present a method for quantifying risk, justifying security upgrade cos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Creating a Balanced Scorecard for Computer Security

    Publication Year: 2006, Page(s):15 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    Information assurance includes the monitoring and controlling of the various aspects of an organization's computer security systems. This paper outlines various approaches to define the measures or metrics that can be used to reliably describe the organization's current IA posture and introduces the use of the balanced scorecard for computer security. The balanced scorecard is most commonly used t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward a Boot Odometer

    Publication Year: 2006, Page(s):19 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    In trustworthy systems, object reuse requirements extend to all forms of memory on the platform and can include volatile elements such as RAM, cache, I/O device registers, and certain controllers. To ensure that residual information is not accessible from one session to another, these regions must be either protected or purged. In situations where the operating system cannot be trusted to meet obj... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of a File Transfer and Web Services Guard Employing Cryptographically Secured XML Security Labels

    Publication Year: 2006, Page(s):26 - 33
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (610 KB) | HTML iconHTML

    This publication introduces the concept of cryptographically secured, extensible markup language (XML) based security labels, which either globally label any non-XML electronic document, or label individual sections of an XML infoset. It further describes the architecture and construction of a guard prototype for file transfer and Web services based applications. This prototype employs the XML sec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Usage-Centric Security Requirements Engineering (USeR) Method

    Publication Year: 2006, Page(s):34 - 41
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    This paper presents an approach for extracting security requirements from early design specifications. An increasing part of the communication and sharing of information in our society utilizes electronic media. Many organizations, especially distributed and Net-centric, are entirely dependent on well functioning information systems. Thus, IT security is becoming central to the ability to fulfill ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Liveness Detection based on Fine Movements of the Fingertip Surface

    Publication Year: 2006, Page(s):42 - 47
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (883 KB) | HTML iconHTML

    We propose a novel method for fingerprint liveness detection, which is based on the analysis of fine movements of the fingertip surface, which are induced by volume changes due to the blood flow. Our method can be implemented in combination with standard optical fingerprint scanners. We present some background information on fingerprint liveness detection such as already proposed methods for liven... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Profiling Users in GUI Based Systems for Masquerade Detection

    Publication Year: 2006, Page(s):48 - 54
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    Masquerading or impersonation attack refers to the illegitimate activity on a computer system when one user impersonates another user. Masquerade attacks are serious in nature due to the fact that they are mostly carried by insiders and thus are extremely difficult to detect. Detection of these attacks is done by monitoring significant changes in user's behavior based on his/her profile. Currently... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The CyberDefense Laboratory: A Framework for Information Security Education

    Publication Year: 2006, Page(s):55 - 60
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB) | HTML iconHTML

    We developed a two-semester curriculum for undergraduate information security education. In the first semester students are provided with the necessary background in cryptography and cryptographic protocols, network security threats and defense mechanisms, as well as an overview of various security models. In the second semester, a set of laboratory-based modules provides the students with hands-o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The CERT Survivability and Information Assurance Curriculum: Building Enterprise Networks on a Firm Educational Foundation

    Publication Year: 2006, Page(s):61 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    Today's professional system and network administrators are increasingly challenged to make computer and network security a greater part of their overflowing set of daily activities. In response to this trend, the Software Engineering Institute (SEI1), specifically the CERTreg Program2, has designed a three-course curriculum in survivability and information assurance (SIA) View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design and Use of Interactive Visualization Applets for Teaching Ciphers

    Publication Year: 2006, Page(s):69 - 75
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (423 KB) | HTML iconHTML

    Cryptography is a fundamental topic in an information assurance curriculum. Students should understand the basic concepts and weaknesses of both historical and current cipher algorithms. Visualization tools can help students understand these concepts, both in the classroom and as out-of-class exercises. This paper describes a set of such tools designed for a cryptography course at the United State... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • P3ARM: Privacy-Preserving Protocol for Association Rule Mining

    Publication Year: 2006, Page(s):76 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    The ability to mine large volumes of distributed datasets enables more precise decision making. However, privacy concerns should be carefully addressed when mining datasets distributed over autonomous sites. We propose a new privacy-preserving protocol for association rule mining (P3ARM) over horizontally partitioned data. P3ARM is based on a distributed implementation of the Apriori algorithm. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cascaded Authorization with Anonymous-Signer Aggregate Signatures

    Publication Year: 2006, Page(s):84 - 91
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    We introduce a decentralized trust management model called anonymous role-based cascaded delegation. In this model, a delegator can issue authorizations on behalf of her role without revealing her identity. This type of delegation protects the sensitive membership information of a delegator and hides the internal structure of an organization. To provide an efficient storage and transmission mechan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Allowing Finer Control Over Privacy Using Trust as a Benchmark

    Publication Year: 2006, Page(s):92 - 99
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (387 KB) | HTML iconHTML

    Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious breach of privacy for the user, in particular, if the personally identifying information is misused by the other users present in the network. Ideally, therefore, the user would like to have a considerable degree of control ov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection

    Publication Year: 2006, Page(s):100 - 107
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (900 KB) | HTML iconHTML

    This paper describes the use of fuzzy logic in the implementation of an intelligent intrusion detection system. The system uses a data miner that integrates Apriori and Kuok's algorithms to produce fuzzy logic rules that capture features of interest in network traffic. Using an inference engine, implemented using FuzzyJess, the intrusion detection system evaluates these rules and gives network adm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attack Characterization and Intrusion Detection using an Ensemble of Self-Organizing Maps

    Publication Year: 2006, Page(s):108 - 115
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    Self-organized maps (SOM) use an unsupervised learning technique to independently organize a set of input patterns into various classes. In this paper, we use an ensemble of SOMs to identify computer attacks and characterize them appropriately using the major classes of computer attacks (denial of service, probe, user-to-root and remote-to-local). The procedure produces a set of confidence levels ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing Attack Trees using Generalized Stochastic Petri Nets

    Publication Year: 2006, Page(s):116 - 123
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (522 KB) | HTML iconHTML

    In recent years, attack trees have been developed to describe processes by which malicious users attempt to exploit or break computer software and/or networks. Attack trees are a way of decomposing, visualizing, and determining the cost or likeliness of attacks. Similarly, Petri nets (PNs) are graphical representations of a system or process used for modeling, formal analysis, and design verificat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Need for a Technical Approach to Digital Forensic Evidence Collection for Wireless Technologies

    Publication Year: 2006, Page(s):124 - 132
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (137 KB) | HTML iconHTML

    Whilst 802.11a/b/g wireless security is well documented by academic literature, there is little work discussing the forensic issues associated with the technology. This paper aims to discuss how 802.11-based wireless technologies may be misused compared with current electronic evidence collection and analysis techniques. The lack of procedural guides in the identification of wireless networks is n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedding Forensic Capabilities into Networks: Addressing Inefficiencies in Digital Forensics Investigations

    Publication Year: 2006, Page(s):133 - 139
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (167 KB) | HTML iconHTML

    When incident responders collect network forensic data, they must often decide between expending resources collecting forensically sound data, and restoring the network as quickly as possible. Organizational network forensic readiness has emerged as a discipline to support these choices, with suggested checklists, procedures and tools. This paper proposes a life cycle methodology for "operationali... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.