Catálogo de publicaciones - libros
Título de Acceso Abierto
Cyber Security
Xiaochun Yun ; Weiping Wen ; Bo Lang ; Hanbing Yan ; Li Ding ; Jia Li ; Yu Zhou (eds.)
En conferencia: 15º China Cyber Security Annual Conference (CNCERT) . Beijing, China . August 14, 2018 - August 16, 2018
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Systems and Data Security
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No requiere | 2019 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-981-13-6620-8
ISBN electrónico
978-981-13-6621-5
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2019
Información sobre derechos de publicación
© The Editor(s) (if applicable) and The Author(s) 2019
Cobertura temática
Tabla de contenidos
A Model of APT Attack Defense Based on Cyber Threat Detection
Yue Li; Teng Zhang; Xue Li; Ting Li
The targets of Advanced Persistent Threat (APT) are mainly concentrate on national key information infrastructure, key research institutes, and large commercial companies, for the purpose of stealing sensitive information, trade secrets or destroying important infrastructure. Traditional protection system is difficult to detect the APT attack, due to the method of the APT attack is unknown and uncertain. And the persisted evolution ability destroyed the traditional protection methods based on feature detection. Therefore, this paper based on the theory of red-blue confrontation, to construct the game model of attack and defense. And then combined the APT offense and defense experience, presents a model based on cyber threat detection to deal with APT attacks.
- Cyber Threat Detection and Defense | Pp. 122-135
A Generic Architecture to Detect Vulnerability Leaks at Crowdsourced Tests
Zhonghao Sun; Zhejun Fang; Yueying He; Jianqiang Li
Nowadays, there is a fundamental imbalance between attackers and defenders. Crowdsourced tests level the playing field. However, the concern about vulnerability leaks severely limits the widespread of crowdsourced tests. Existing crowdsourced test platforms have adopt various technical or management approaches to protect applications or systems under test, but none of them is able to remove the concerns about vulnerability leaks. This paper provides a generic architecture to discover the white hat who finds a vulnerability but conceals it. The architecture is not only valid for public vulnerabilities, but also valid for unknown vulnerabilities. Finally, the proposed architecture is tested by real vulnerabilities. The results show that, with proper rules, most of the concealing behaviors can be detected.
- Cyber Threat Detection and Defense | Pp. 136-144
Security Against Network Attacks on Web Application System
Yashu Liu; Zhihai Wang; Shu Tian
With the development of Internet, web applications are more and more. Network attacks have become increasingly serious problem. How to make network security administrators quickly discover vulnerabilities and protect networks against attacks has become an important part of network security protection. In this paper, it introduces the principle of web vulnerabilities and implements a forum system built in some web vulnerabilities. Then it simulates the process of web attacks according to various types of vulnerabilities and gives the defensive means separately. This system can be used to conduct security training, test security tools, and practice common penetration testing techniques for network administrators and web developers.
- Cyber Threat Detection and Defense | Pp. 145-152
Association Visualization Analysis for the Application Service Layer and Network Control Layer
Mianmian Shi; Huaping Cao
Most researches about complex networks are single-layer networks-based representation. However, in most cases, systems in the real world are not isolated but connective. In this paper, different from the traditional Open System Interconnection (OSI) model, our research pays attention to application service layer and network control layer for the view of application. Two layers connect with each other by using IP mapping relationship. Firstly, to avoid unnecessary loss of computational efficiency, we modify Louvain algorithm to divide the nodes in network control layer into several parts. Secondly, we add additional community attractive force and introduce Barnes-Hut force-calculation model to Fruchterman-Reingold algorithm in order to make nodes in network control layer aligned more structured and well-distributed efficiently. Finally, we merge the application service layer and the network control layer into a two-layer visualization model. Based on our two-layer model, the whole network trend, topology and incidence relation can be conveniently grasped.
- Cyber Threat Detection and Defense | Pp. 153-164
Trusted Secure Accessing Protection Framework Based on Cloud-Channel-Device Cooperation
Yexia Cheng; Yuejin Du; Jin Peng; Jun Fu; Baoxu Liu
With the rapid development of network technologies, such as mobile Internet, Internet of Things (IoT), secure accessing is becoming an important issue. Security protection framework based on cloud-channel-device cooperation is proposed in this paper to solve the issue. The trust base is introduced to channel-end to improve trust of secure accessing device. Then, the trust and security module are designed in the cloud-end. Meanwhile, access control based on connection tracking is adopted to reduce access latency. The framework can be used to construct an open, trusted, resilient network for secure accessing and provide security solutions for mobile office, IoT security, information security management and control, etc. The effectiveness of the framework has been proved by its application to the market.
- Cyber Threat Detection and Defense | Pp. 165-176