Cyber Security : : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers.

Saved in:
Bibliographic Details
Superior document:Communications in Computer and Information Science Series ; v.1299
:
TeilnehmendeR:
Place / Publishing House:Singapore : : Springer Singapore Pte. Limited,, 2021.
©2020.
Year of Publication:2021
Edition:1st ed.
Language:English
Series:Communications in Computer and Information Science Series
Online Access:
Physical Description:1 online resource (235 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Intro
  • Preface
  • Organization
  • Contents
  • Access Control
  • PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural Network
  • 1 Introduction
  • 2 Background
  • 2.1 Password Attack
  • 2.2 Password Sniffing Attack
  • 2.3 Neural Network in Network Traffic Classification
  • 3 Attack Model
  • 4 PassEye Design
  • 4.1 Overview
  • 4.2 Feature Extraction and Selection
  • 4.3 Neural Network Model
  • 5 Evaluation
  • 5.1 Environment Setup
  • 5.2 Dataset
  • 5.3 Effectiveness of PassEye
  • 5.4 Discussion
  • 6 Conclusion and Future Work
  • References
  • Research on the Development Route of International Communication Accesses
  • 1 Background
  • 2 Current Situation of International Communication Networks
  • 2.1 International Communication Access
  • 2.2 International Submarine Cable Construction
  • 2.3 Cross-Border Terrestrial Cable Construction
  • 3 Factors Affecting International Access Establishment
  • 3.1 Policy Environment
  • 3.2 Geographical Environment
  • 3.3 Necessity of International Access Construction
  • 3.4 Feasibility of International Access Construction
  • 3.5 Security Assurance Measures
  • 4 International Access Establishment Case
  • 4.1 Environment Factor
  • 4.2 Necessity Analysis
  • 4.3 Construction Feasibility Analysis
  • 5 International Access Development Recommendations
  • 6 Conclusion
  • References
  • Cryptography
  • A Secure Ranked Search Model Over Encrypted Data in Hybrid Cloud Computing
  • 1 Introduction
  • 2 Related Work
  • 2.1 The Okapi BM25 Model Over Plain Text
  • 2.2 Fully Homomorphic Encryption
  • 2.3 The Applicability of Hybrid Cloud Computing
  • 3 Secure Ranked Search Model Over Hybrid Cloud
  • 3.1 The Architecture of the Secure Ranked Search Model Over Hybrid Cloud
  • 3.2 The Implementation of Fully Homomorphic Encryption Based Secure Ranking Scheme
  • 4 Experiment Result and Future Work.
  • 4.1 Preliminary Experimental Result
  • 4.2 Future Work
  • 5 Conclusion
  • References
  • Based on GAN Generating Chaotic Sequence
  • 1 Introduction
  • 2 Basic Adversarial Encryption Algorithm and Chaotic Map
  • 2.1 Basic Adversarial Encryption Communication Model
  • 2.2 Logistic Chaotic Map
  • 3 Adversarial Encryption Algorithm Based on Logistic Mapping
  • 3.1 Key Generator Based on GAN
  • 3.2 The Overall Encryption Algorithm Design
  • 4 Experimental Procedure
  • 4.1 Experimental Environment
  • 4.2 Key Security Analysis
  • 4.3 Analysis of Encryption Model Performance
  • 5 Conclusion
  • References
  • MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks
  • 1 Introduction
  • 2 Background
  • 2.1 Cryptocurrency Mining and Cryptojacking Attacks
  • 2.2 Related Web Techniques
  • 3 System Overview
  • 3.1 Challenges and Our Solutions
  • 3.2 JavaScript Instrumentation
  • 3.3 Machine Learning Based Detection
  • 3.4 Data-Driven Feature Selection
  • 3.5 Security Enforcement
  • 4 Evaluation
  • 4.1 Dataset
  • 4.2 Accuracy
  • 4.3 Overhead
  • 5 Related Work
  • 6 Conclusions and Future Work
  • References
  • Research on Industrial Internet Security Emergency Management Framework Based on Blockchain: Take China as an Example
  • 1 Introduction
  • 2 Situation and Challenge
  • 2.1 Organizational Structure
  • 2.2 Technical Status
  • 2.3 Challenge
  • 3 Overview of Blockchain
  • 3.1 Principle
  • 3.2 Research Status
  • 4 Consortium-Blockchain-Based ISEMS
  • 4.1 Base Model
  • 4.2 Architecture
  • 4.3 Organization Structure
  • 4.4 Critical Process
  • 5 Summary and Prospect
  • References
  • Research Status and Prospect of Blockchain Technology in Agriculture Field
  • 1 Introduction
  • 2 Overview of Blockchain
  • 2.1 Core of Blockchain Technology in Agriculture
  • 2.2 Application of Blockchain in Agriculture.
  • 3 Current Situation of Agricultural Supply Chain
  • 3.1 Upstream Link
  • 3.2 Mid-Stream Link
  • 3.3 Downstream Link
  • 3.4 Trading Link
  • 4 Current Status of Agricultural Products Traceability
  • 4.1 Solves the Problem of Accountability for Agricultural Products
  • 4.2 Solves the Problem of Traceability Trust for Agricultural Products
  • 5 Summary and Prospect
  • References
  • Denial-of-Service Attacks
  • Practical DDoS Attack Group Discovery and Tracking with Complex Graph-Based Network
  • 1 Introduction
  • 2 Methodology and Background
  • 3 DDoSAGD - DDoS Attack Group Discovery Framework
  • 3.1 Basic Concepts and Fundamental Graph Initialization
  • 3.2 Meta Path-Based Similarity Framework
  • 3.3 Hierarchical Community Discovery
  • 4 Evaluation
  • 4.1 Statistics of Input Data and Graphs
  • 4.2 Situation Awareness of DDoS Attack Groups
  • 5 Conclusion
  • References
  • Hardware Security Implementation
  • Research on the Remote Deployment Design of OTN Electrical Racks
  • 1 Background
  • 1.1 Current Situation
  • 1.2 Inevitability of Remote Electrical Rack Deployment
  • 2 Implementation Mode and Impact
  • 2.1 Implementation Modes
  • 2.2 Impact on System OSNR
  • 2.3 Impact on the Receive Optical Power of the OM/OD or OTU Boards
  • 2.4 Other Impacts
  • 3 Applicability Analysis
  • 3.1 Advantages and Disadvantages
  • 3.2 Scenario Analysis
  • 4 Test Models and Simulation
  • 4.1 Scenario-Based Modeling
  • 4.2 Solution-Based Simulation for Different Scenarios
  • 4.3 Conclusion
  • 5 Application on Live Networks
  • 5.1 Live Network Description
  • 5.2 Solution Selection
  • 6 Conclusions and Suggestions
  • Intrusion/Anomaly Detection and Malware Mitigation
  • An Effective Intrusion Detection Model Based on Pls-Logistic Regression with Feature Augmentation
  • 1 Introduction
  • 2 Methodology
  • 2.1 Feature Augmentation.
  • 2.2 Pls-Logistic Regression Classification Model
  • 3 Proposed Intrusion Detection Model: Fa-Plslogistic
  • 4 Experimental Setting
  • 4.1 Dataset Description
  • 4.2 Experimental Results and Discussion
  • 5 Conclusion
  • References
  • DeepHTTP: Anomalous HTTP Traffic Detection and Malicious Pattern Mining Based on Deep Learning
  • 1 Introduction
  • 2 Related Work
  • 2.1 Malicious Traffic Detection
  • 2.2 Pattern Mining Method
  • 3 Preliminaries
  • 3.1 DeepHTTP Architecture and Overview
  • 3.2 Data Preprocessing
  • 4 Our Approach
  • 4.1 Anomaly HTTP Traffic Detection
  • 4.2 Mining Stage
  • 5 Evaluation
  • 5.1 Dataset
  • 5.2 Validation of Structural Feature Extraction Method
  • 5.3 Model Comparison
  • 5.4 Malicious Pattern Mining
  • 6 Conclusion
  • References
  • Social Network Security and Privacy
  • A Label Propagation Based User Locations Prediction Algorithm in Social Network
  • 1 Introduction
  • 2 Related Work
  • 3 Related Concept and Problem Definition
  • 4 Label Propagation Based User Location Prediction Algorithm
  • 5 Experiment Result and Analysis
  • 5.1 Data Set Description
  • 5.2 Experimental Results Analysis
  • 6 Conclusion
  • References
  • Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization
  • 1 Introduction
  • 2 Related Work
  • 3 System Overview
  • 4 Module Design
  • 4.1 Location Division Module
  • 4.2 Personalized Location Privacy
  • 4.3 Location Density Collection Module
  • 5 Experimental Validation
  • 5.1 Experiment Setup
  • 5.2 Experiment Results
  • 6 Conclusion
  • References
  • Systems Security
  • Analysis on the Security of Satellite Internet
  • 1 Introduction
  • 2 Related Work
  • 3 Analysis of SI Security
  • 3.1 Overview of Security Issues of SI
  • 3.2 National Security Issues
  • 3.3 Network Security Issues
  • 3.4 Equipment Security Issues
  • 4 Conclusion
  • References.
  • A Survey on Cyberspace Search Engines
  • 1 Introduction
  • 2 Supporting Internet Protocols
  • 3 Total Amounts of Detected Devices
  • 4 Device Information
  • 5 Scanning Frequency
  • 6 System Architecture
  • 7 Third Party Databases
  • 8 Probes Distribution
  • 9 Conclusion
  • References
  • Brief Introduction of Network Security Asset Management for Banks
  • 1 Introduction
  • 2 Detection of Network Security Assets
  • 3 Management of Network Security Assets
  • 4 Applications of Network Security Assets
  • 5 Design of Network Security Assets Management System
  • 6 Conclusions
  • References
  • Embedded Security-Critical Device Resource Isolation
  • 1 Introduction
  • 2 Related Work
  • 2.1 Resource Software Isolation
  • 2.2 Resource Hardware Isolation
  • 2.3 Current Status of Research on Resource Isolation of Vehicle System
  • 2.4 Current Status of Anti-virus Software Running on Vehicle Systems
  • 3 Modeling of Vehicle Resource Isolation System
  • 3.1 Isolation Model Design
  • 3.2 Implementation and Verification of on-Board System
  • 3.3 Test and Analysis
  • 4 Conclusion
  • References
  • Author Index.