By Topic

Network and System Security, 2009. NSS '09. Third International Conference on

Date 19-21 Oct. 2009

Filter Results

Displaying Results 1 - 25 of 102
  • [Front cover]

    Publication Year: 2009
    Request permission for commercial reuse | PDF file iconPDF (349 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (178 KB)
    Freely Available from IEEE
  • Message from General Chair

    Publication Year: 2009, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (116 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chairs

    Publication Year: 2009, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (134 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2009, Page(s):xv - xvii
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • Keynote speakers

    Publication Year: 2009, Page(s):xix - xxi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (111 KB)

    Flooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the user-friendliness of the Internet as well as the difficulty in the authentication for the access of specific categories of information, curbing the transmission of harmful information, i.e., to assure the information content security (ICS), has become a reasonable yet ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hardware Trojan Horse Device Based on Unintended USB Channels

    Publication Year: 2009, Page(s):1 - 8
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (389 KB) | HTML iconHTML

    This paper discusses research activities that investigated the risk associated with USB devices. The research focused on identifying, characterizing and modelling unintended USB channels in contemporary computer systems. Such unintended channels can be used by a USB hardware Trojan horse device to create two way communications with a targeted network endpoint, thus violating the integrity and conf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics

    Publication Year: 2009, Page(s):9 - 17
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (684 KB) | HTML iconHTML

    Both Flash crowds and DDoS (Distributed Denial-of-Service) attacks have very similar properties in terms of Internet traffic, however Flash crowds are legitimate flows and DDoS attacks are illegitimate flows, and DDoS attacks have been a serious threat to Internet security and stability. In this paper we propose a set of novel methods using probability metrics to distinguish DDoS attacks from Flas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing RFID Tag Resistance against Cloning Attack

    Publication Year: 2009, Page(s):18 - 23
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    In its current form, RFID system are susceptible to a range of malevolent attacks. With the rich business intelligence that RFID infrastructure could possibly carry, security is of paramount importance. In this paper, we formalise various threat models due tag cloning on the RFID system. We also present a simple but efficient and cost effect technique that strengthens the resistance of RFID tags t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Data Mining Approach for Detection of Self-Propagating Worms

    Publication Year: 2009, Page(s):24 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB) | HTML iconHTML

    In this paper we demonstrate our signature based detector for self-propagating worms. We use a set of worm and benign traffic traces of several endpoints to build benign and worm profiles. These profiles were arranged into separate n-ary trees. We also demonstrate our anomaly detector that was used to deal with tied matches between worm and benign trees. We analyzed the performance of each detecto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Information Filtering Approach

    Publication Year: 2009, Page(s):30 - 35
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    Web mining is used to automatically discover and extract information from Web-related data source such as documents, services and user profiles. Although standard data mining methods are applied for mining on the Web, specific algorithms need to be developed and applied for Web based information processing in Web resources. In our paper, we develop a method to filter the relevant information to us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture Design of High Efficient and Non-memory AES Crypto Core for WPAN

    Publication Year: 2009, Page(s):36 - 43
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1025 KB) | HTML iconHTML

    This paper presents the architecture design of a high efficient and non-memory Advanced Encryption Standard (AES) crypto core to fit WPAN security requirement. The proposed basis transformation approach from Galois Field (28) to Galois Field GF(((22)2)2) can significantly reduce the hardware complexity of the SubBytes Transformation (S-box). Besides, the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cryptographically t-Private Auction System

    Publication Year: 2009, Page(s):44 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (499 KB) | HTML iconHTML

    We present a feasible cryptographically t-private protocol for electronic auctions. Our construction is based on Yao's garbled circuits and pseudorandom number generators (PRNG). Our protocol involves a field of (t+1)2 parties for the generation of the garbled circuit and permits an arbitrary large number of bidders. The computational requirements are low: Only t+1 parties of the field ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a Secure Router System for Next-Generation Networks

    Publication Year: 2009, Page(s):52 - 59
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (657 KB) | HTML iconHTML

    Computer networks are vulnerable to attacks, where the network infrastructure itself is targeted. Emerging router designs, which use software-programmable embedded processors, increase the vulnerability to such attacks. We present the design of a secure packet processing platform (SPPP) that can protect these router systems. We use an instruction-level monitoring system to detect deviations in pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Changing Network Behavior

    Publication Year: 2009, Page(s):60 - 66
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (359 KB) | HTML iconHTML

    The security of computer networks has been in the focus of research for years. While several sophisticated systems had been developed in the area of intrusion detection, new challenges arised. Pattern matching systems are not able to cope with high bandwidth (10 Gbps +) when analyzing the whole payload. Furthermore, new attack schemes arise by increasingly complex software and systems. New approac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Grid of Security: A New Approach of the Network Security

    Publication Year: 2009, Page(s):67 - 72
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB) | HTML iconHTML

    Network security is in a daily evolving domain. Every day, new attacks, virus or intrusion techniques are released. Hence, network devices, enterprise servers or personal computers are potential targets of these attacks. Current security solutions like firewalls, intrusion detection systems (IDS) and virtual private networks (VPN) are centralized solutions which rely mostly on the analyze of inbou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad Hoc Networks

    Publication Year: 2009, Page(s):73 - 80
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (562 KB) | HTML iconHTML

    The wormhole attack is considered to be a serious security attack in multihop ad hoc and sensor networks. We propose "DeWorm", a simple protocol to effectively detect wormhole attacks without the need for special hardware and/or strict location or synchronization requirements. DeWorm makes use of discrepancies in routing information between neighbors to detect wormholes. A simulation based analysi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effective Attacks in the Tor Authentication Protocol

    Publication Year: 2009, Page(s):81 - 86
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    As an anonymous Internet communication system Tor is popular and famous, being used by lots of users. The security of Tor is based on the authentication protocol. Although the Tor authentication protocol has been proved secure, this paper discovers its security vulnerability through its concurrency analysis, and shows it cannot be securely executed by multiple concurrent sessions. A new session-ke... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Authenticated Key Establishment Protocol for Ad Hoc Networks

    Publication Year: 2009, Page(s):87 - 94
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (486 KB) | HTML iconHTML

    Multicast communication in dynamic environments like ad hoc networks are potentially of critical concern. As group members move in and out of the group, in order to preserve confidentiality, it becomes imperative to use cryptographic keys with rekeying mechanism each time a user enters or leaves. Therefore, in dynamic environments rekeying introduces a significant computational and communication o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Evaluation of Secure Real-Time Transport Protocol (SRTP) Performance for VoIP

    Publication Year: 2009, Page(s):95 - 101
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (526 KB) | HTML iconHTML

    The Secure Real-Time Transport Protocol (SRTP) is an Internet standards-track security profile for RTP used to provide confidentiality, integrity and replay protection for RTP traffic. We study the performance of SRTP when it is used to secure VoIP conversations. Experiments are conducted using snom and Twinkle softphones running on Windows and Linux platforms respectively and a bare PC softphone ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.