𝔖 Scriptorium
✦   LIBER   ✦

📁

Security in Computing and Communications: 8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers (Communications in Computer and Information Science)

✍ Scribed by Sabu M. Thampi (editor), Guojun Wang (editor), Danda B. Rawat (editor), Ryan Ko (editor), Chun-I Fan (editor)


Publisher
Springer
Year
2021
Tongue
English
Leaves
314
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online.

The 13 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.


✦ Table of Contents


Preface
Organization
Contents
Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools
1 Introduction
2 Related Work
2.1 Background
2.2 Related Research
3 Proposed Framework
3.1 Threat Modelling
3.2 Framework Design
4 Case Study and Experiments
4.1 Framework Implementation
4.2 Implementation of Automated Cybersecurity Tool
4.3 Case Study 1 – Automated Exploit
4.4 Case Study 2 – Incompatibility of the DECREE System
5 Result and Analysis
5.1 Case Study 1 – Result
5.2 Case Study 1 – Analysis
5.3 Case Study 2 – Result
5.4 Case Study 2 – Analysis
6 Concluding Remarks and Future Work
7 Access to Code and Artifacts
References
A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database Systems
1 Introduction
2 Our System Model
3 Overview of a Global Consistent-Transaction Checkpoint
4 Related Work
5 Proposed Checkpointing Algorithm
5.1 Motivation and Description of Our Algorithm
5.2 Algorithm Implementation – Pseudocode
6 Performance Comparison
7 Simulation Results and Comparisons
8 Conclusions and Future Work
References
Evading Static and Dynamic Android Malware Detection Mechanisms
1 Introduction
2 Related Works
3 Machine Learning for Android Malware Detection
4 Method of Attack
5 Evading Opcode Based Android Malware Detection Mechanism
5.1 Preprocessing
5.2 Training the Classifier
5.3 Testing the Classifier
5.4 Dalvik Opcode Injection
6 Evading System Call Graph Based Android Malware Detection Mechanism
6.1 Preprocessing and Signal Extraction
6.2 Training the Classifier
6.3 Testing the Classifier
6.4 System Call Injection
7 Conclusion and Future Work
References
Multilevel Secure Container Deployment Framework in Edge Computing
1 Introduction
2 Related Work
2.1 Performance Evaluation
2.2 Microservices on IOT Edge Using Containers
3 Multilevel Framework Algorithm
4 Experimental Analysis
4.1 Experimental Setup
4.2 Performance of gVisor Containers
4.3 Security of gVisor Containers
4.4 Multilevel Container Deployment
5 Conclusion and Future Work
References
Deep Hierarchical App Recommendation with Dynamic Behaviors
1 Introduction
2 Related Work
2.1 Challenges in Recommendation
2.2 Personalized Recommendation System
3 Data Analysis
3.1 Dataset
3.2 User Features
3.3 App Features
4 The Hierarchical App Recommendation Model
4.1 Dynamic Hierarchy Model
4.2 User Hierarchy Based Personalized App Recommendation Model
5 Experiments
5.1 Experiments on DHM
5.2 Experiments on UHAM
6 Conclusion and Future Work
References
New Security Architecture of Access Control in 5G MEC
1 Introduction
2 The High-Level Security Architecture of Access Control
3 Use Cases of MEC-Based Services
4 MEC Enabler: 5G MEC Access Control and Credentials Management System
5 Examples of Exchange of Access Control Messages in the 5G MEC
6 Conclusions and Future Work
References
A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments
1 Introduction
2 Preliminaries
2.1 5G Environments
2.2 Bilinear Pairings
2.3 Boneh-Boyen Signature Scheme
2.4 Proxy Re-signature Scheme
3 Related Works
3.1 Yang et al.'s Blockchain-Based Architecture
3.2 Ni et al.'s Network Slicing Scheme
3.3 Ying et al.'s Authentication Protocol
4 The Construction
4.1 Notations
4.2 Setup
4.3 Registration
4.4 Authentication
4.5 Handover 1
4.6 Handover 2
5 Comparison
5.1 Properties Comparison
5.2 Performance Comparison
6 Conclusion
References
A Survey of Security Attacks on Silicon Based Weak PUF Architectures
1 Introduction
2 Classification of Weak PUFs
2.1 Delay Based Weak PUFs
2.2 Memory Based Weak PUFs
2.3 Strength and Weaknesses
3 Security Attacks on Weak PUFs
3.1 Modeling Attacks (ML) on Weak PUFs
3.2 Non-invasive Attacks on Weak PUFs
3.3 Semi-invasive Attack on Weak PUFs
3.4 Invasive Attacks on Weak PUFs
3.5 Cloning Attacks on Weak PUFs
3.6 Comparative Analysis of Implementation Attacks on Variants of Weak PUFs
4 Countermeasures
4.1 Countermeasures Against Modeling Attacks
4.2 Countermeasures Against Non-invasive Attacks
4.3 Countermeasures Against Semi-invasive Attacks
4.4 Countermeasures Against Invasive and Cloning Attacks
5 Conclusion
References
On the Feasibility of DoS Attack on Smart Door Lock IoT Network
1 Introduction
2 Related Work
2.1 Network Security in IoT and IoT Architecture
2.2 Security Features
2.3 Security Challenges in the IoT
3 Results and Evaluation
3.1 Capturing Stakeholders Requirements and Their Opinion
3.2 Designing and Building the System for Evaluation
3.3 Evaluation: Findings and Examination Results
4 Analysis and Proposal for Improved System
5 Conclusion
References
Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learning
1 Introduction
2 Related Works
3 System Model
3.1 Network Model
3.2 Adversary Model
4 Proposed Method
4.1 Trust Model
4.2 Reinforcement Learning for Dynamic Weight Evaluation for Optimal Strategy
5 Performance Evaluation
6 Conclusion
References
Benchmarking Behavior-Based Intrusion Detection Systems with Bio-inspired Algorithms
1 Introduction
2 Background
2.1 Behaviour-Based IDS
2.2 Learning Strategies
2.3 Dataset CSE-CIC-IDS2018
2.4 Bioinspired Algorithms
3 Tests Setup
3.1 Test Scenarios
3.2 Methodology
4 Results
5 Results Analysis
5.1 Results - Module A
5.2 Results - Module B
6 Conclusions and Future Work
References
Thermal Management in Large Data Centres: Security Threats and Mitigation
1 Introduction
2 Thermal Management in Data Centers
3 Security Threats and Their Impact
4 Thermal Anomaly Detection in Data Centers
5 Multi-variant Anomaly Detection and Fuzzy Logic
5.1 Step 1: Thermal Sensors Grouping
5.2 Step 2: Fault Detection
5.3 Step 3: Anomaly Region Detection
5.4 Step 4: Fuzzy Sets
6 Conclusions and Future Work
References
Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm
1 Introduction
2 Related Work
2.1 Statistical Techniques
2.2 Sequential Techniques
2.3 Frequency Based Techniques
2.4 Machine Learning Techniques
3 Proposed Detection Technique
3.1 General Approach
3.2 Anomaly Detection Algorithm
3.3 Pre-processing
3.4 Cold Start
3.5 Data Mining - Analyzing CAN Bus Valid Data
3.6 Pattern Matching Algorithm
3.7 Pattern Classification
4 Evaluation and Results
4.1 Data Set
4.2 Evaluation Parameters
4.3 Algorithm Performance
4.4 Comparison the Results with Theoretical Analyzes
4.5 Comparison with Previous Works
5 Discussion and Conclusions
References
Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption Over Outsourced Encrypted Data
1 Introduction
2 Related Work
3 The Proposed CFR DSSE Scheme
3.1 Preliminaries and Model
3.2 Definitions
3.3 CFR – DSSE Scheme: Detailed Working and Algorithms
4 Security and Performance Analysis
4.1 Security Analysis
4.2 Performance Analysis
5 Conclusion and Future Work
References
Performance Study of Multi-target Tracking Using Kalman Filter and Hungarian Algorithm
1 Introduction
2 Existing Techniques
2.1 Statistical Method
2.2 Template Method
2.3 Multi-view Based Method
2.4 Clustering Method
3 Algorithm Overview
4 Object Detection
4.1 Background Elimination
4.2 Gaussian Filter
5 Object Tracking
5.1 Kalman Filter
5.2 2-D Kalman Filter Matlab Implementation
5.3 Hungarian Algorithm
6 Simulation Results
6.1 Root Mean Square Error (RMSE) Results
7 Conclusion
References
SaaS - Microservices-Based Scalable Smart Contract Architecture
1 Introduction
1.1 Outline
2 Mystiko Blockchain
2.1 Mystiko Overview
2.2 Mystiko Architecture
2.3 Aplos Smart Actors
3 SaaS
3.1 Overview
3.2 SaaS Scenario
3.3 Smart Contract Services
3.4 Smart Contract Service Communication
3.5 Concurrent Transaction Execution
3.6 Scalability and Load Balancing
4 Performance Evaluation
4.1 Performance of Invoke Transactions
4.2 Performance of Query Transactions
4.3 Scalability Performance
4.4 Transaction Latency
4.5 Transaction Execution Rate
5 Related Work
6 Conclusions and Future Work
References
GIDS: Anomaly Detection Using Generative Adversarial Networks
1 Introduction
2 Related Work
3 Background and the Proposed System
3.1 Generative Adversarial Networks
3.2 Anomaly Score
4 Analysis and Experimental Results
5 Conclusion
References
Audio Steganography Using Multi LSB and IGS Techniques
1 Introduction
2 Literature Review
3 Proposed Methodology
3.1 Transmitter End
3.2 Receiver End
4 Results and Observations
5 Conclusion and Future Work
References
A Forensic Analysis on the Availability of MQTT Network Traffic
1 Introduction
1.1 Overview of MQTT
1.2 Vulnerabilities, Attacks and Reasons
2 Related Works
2.1 Additional Layer of Security and Suggestion Frameworks
2.2 IDS and Machine Learning
2.3 Forensic Approach
3 Analysis
3.1 Challenges in IoT Forensics
3.2 Intrusion into MQTT Broker
3.3 DoS Attack on MQTT Broker
3.4 Observations on Machine Learning Approach
4 Conclusion and Future Work
References
The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications
1 Introduction
2 Legal Framework
2.1 Personal Data
2.2 The Terms of Security and Data Privacy
2.3 The Need for Personal Data Protection
2.4 General Regulation on Personal Data Protection (GDPR)
2.5 Privacy Enhancing Technologies: Categories and Tools
2.6 Social Engineering Attacks
3 Data Privacy: By Design and By Default
4 Research Work and Contribution
4.1 Experimental and Monitoring Environment
4.2 Processing Transparency
4.3 Research Results
5 Conclusions and Future Work
References
Analysis of Orthogonal Time Frequency Space Transceiver in Baseband Environment
1 Introduction
2 Related Work
3 OTFS System Model
4 Message Passing Algorithm for OTFS Symbol Detection
5 Numerical Results
6 Conclusion
References
Author Index


📜 SIMILAR VOLUMES


Security in Computing and Communications
✍ Sabu M. Thampi (editor), Gregorio Martinez Perez (editor), Ryan Ko (editor), Dan 📂 Library 📅 2020 🏛 Springer 🌐 English

<span>This book constitutes the refereed proceedings of the 7th International Symposium on Security in Computing and Communications, SSCC 2019, held in Trivandrum, India, in December 2019. </span><p></p><p><span>The 22 revised full papers and 7 revised short papers presented were carefully reviewed

Communication, Networks and Computing: S
✍ Ranjeet Singh Tomar (editor), Shekhar Verma (editor), Brijesh Kumar Chaurasia (e 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book constitutes selected and revised papers presented at the Second International Conference on Communication, Networks and Computing, CNC 2020, held in Gwalior, India, in December 2020. <br>The 23 full papers and 7 short papers were thoroughly reviewed and selected from the 102 submissi

Information, Communication and Computing
✍ Mahua Bhattacharya (editor), Latika Kharb (editor), Deepak Chahal (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

This book constitutes the refereed proceedings of the 6th International Conference on Information, Communication and Computing Technology, ICICCT 2021, held in New Delhi, India, in May 2021.<p>The 16 full papers and 4 short paper presented in this volume were carefully reviewed and selected from 83

Information, Communication and Computing
✍ Mahua Bhattacharya (editor), Latika Kharb (editor), Deepak Chahal (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book constitutes the refereed proceedings of the 6th International Conference on Information, Communication and Computing Technology, ICICCT 2021, held in New Delhi, India, in May 2021.</span><p><span>The 16 full papers and 4 short paper presented in this volume were carefully reviewed an

Security in Computing and Communications
✍ Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat, Jose M. Alcaraz Cale 📂 Library 📅 2019 🏛 Springer Singapore 🌐 English

<p>This book constitutes the refereed proceedings of the 6th International Symposium on Security in Computing and Communications, SSCC 2018, held in Bangalore, India, in September 2018.<p></p><p>The 34 revised full papers and 12 revised short papers presented were carefully reviewed and selected fro