Catálogo de publicaciones - libros

Compartir en
redes sociales


Título de Acceso Abierto

Cyber Security

Xiaochun Yun ; Weiping Wen ; Bo Lang ; Hanbing Yan ; Li Ding ; Jia Li ; Yu Zhou (eds.)

En conferencia: 15º China Cyber Security Annual Conference (CNCERT) . Beijing, China . August 14, 2018 - August 16, 2018

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Systems and Data Security

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No requiere 2019 SpringerLink acceso abierto

Información

Tipo de recurso:

libros

ISBN impreso

978-981-13-6620-8

ISBN electrónico

978-981-13-6621-5

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© The Editor(s) (if applicable) and The Author(s) 2019

Tabla de contenidos

A Model of APT Attack Defense Based on Cyber Threat Detection

Yue Li; Teng Zhang; Xue Li; Ting Li

The targets of Advanced Persistent Threat (APT) are mainly concentrate on national key information infrastructure, key research institutes, and large commercial companies, for the purpose of stealing sensitive information, trade secrets or destroying important infrastructure. Traditional protection system is difficult to detect the APT attack, due to the method of the APT attack is unknown and uncertain. And the persisted evolution ability destroyed the traditional protection methods based on feature detection. Therefore, this paper based on the theory of red-blue confrontation, to construct the game model of attack and defense. And then combined the APT offense and defense experience, presents a model based on cyber threat detection to deal with APT attacks.

- Cyber Threat Detection and Defense | Pp. 122-135

A Generic Architecture to Detect Vulnerability Leaks at Crowdsourced Tests

Zhonghao Sun; Zhejun Fang; Yueying He; Jianqiang Li

Nowadays, there is a fundamental imbalance between attackers and defenders. Crowdsourced tests level the playing field. However, the concern about vulnerability leaks severely limits the widespread of crowdsourced tests. Existing crowdsourced test platforms have adopt various technical or management approaches to protect applications or systems under test, but none of them is able to remove the concerns about vulnerability leaks. This paper provides a generic architecture to discover the white hat who finds a vulnerability but conceals it. The architecture is not only valid for public vulnerabilities, but also valid for unknown vulnerabilities. Finally, the proposed architecture is tested by real vulnerabilities. The results show that, with proper rules, most of the concealing behaviors can be detected.

- Cyber Threat Detection and Defense | Pp. 136-144

Security Against Network Attacks on Web Application System

Yashu Liu; Zhihai Wang; Shu Tian

With the development of Internet, web applications are more and more. Network attacks have become increasingly serious problem. How to make network security administrators quickly discover vulnerabilities and protect networks against attacks has become an important part of network security protection. In this paper, it introduces the principle of web vulnerabilities and implements a forum system built in some web vulnerabilities. Then it simulates the process of web attacks according to various types of vulnerabilities and gives the defensive means separately. This system can be used to conduct security training, test security tools, and practice common penetration testing techniques for network administrators and web developers.

- Cyber Threat Detection and Defense | Pp. 145-152

Association Visualization Analysis for the Application Service Layer and Network Control Layer

Mianmian Shi; Huaping Cao

Most researches about complex networks are single-layer networks-based representation. However, in most cases, systems in the real world are not isolated but connective. In this paper, different from the traditional Open System Interconnection (OSI) model, our research pays attention to application service layer and network control layer for the view of application. Two layers connect with each other by using IP mapping relationship. Firstly, to avoid unnecessary loss of computational efficiency, we modify Louvain algorithm to divide the nodes in network control layer into several parts. Secondly, we add additional community attractive force and introduce Barnes-Hut force-calculation model to Fruchterman-Reingold algorithm in order to make nodes in network control layer aligned more structured and well-distributed efficiently. Finally, we merge the application service layer and the network control layer into a two-layer visualization model. Based on our two-layer model, the whole network trend, topology and incidence relation can be conveniently grasped.

- Cyber Threat Detection and Defense | Pp. 153-164

Trusted Secure Accessing Protection Framework Based on Cloud-Channel-Device Cooperation

Yexia Cheng; Yuejin Du; Jin Peng; Jun Fu; Baoxu Liu

With the rapid development of network technologies, such as mobile Internet, Internet of Things (IoT), secure accessing is becoming an important issue. Security protection framework based on cloud-channel-device cooperation is proposed in this paper to solve the issue. The trust base is introduced to channel-end to improve trust of secure accessing device. Then, the trust and security module are designed in the cloud-end. Meanwhile, access control based on connection tracking is adopted to reduce access latency. The framework can be used to construct an open, trusted, resilient network for secure accessing and provide security solutions for mobile office, IoT security, information security management and control, etc. The effectiveness of the framework has been proved by its application to the market.

- Cyber Threat Detection and Defense | Pp. 165-176