5 research outputs found

    D-FENS: DNS Filtering & Extraction Network System for Malicious Domain Names

    Get PDF
    While the DNS (Domain Name System) has become a cornerstone for the operation of the Internet, it has also fostered creative cases of maliciousness, including phishing, typosquatting, and botnet communication among others. To address this problem, this dissertation focuses on identifying and mitigating such malicious domain names through prior knowledge and machine learning. In the first part of this dissertation, we explore a method of registering domain names with deliberate typographical mistakes (i.e., typosquatting) to masquerade as popular and well-established domain names. To understand the effectiveness of typosquatting, we conducted a user study which helped shed light on which techniques were more successful than others in deceiving users. While certain techniques fared better than others, they failed to take the context of the user into account. Therefore, in the second part of this dissertation we look at the possibility of an advanced attack which takes context into account when generating domain names. The main idea is determining the possibility for an adversary to improve their success rate of deceiving users with specifically-targeted malicious domain names. While these malicious domains typically target users, other types of domain names are generated by botnets for command & control (C2) communication. Therefore, in the third part of this dissertation we investigate domain generation algorithms (DGA) used by botnets and propose a method to identify DGA-based domain names. By analyzing DNS traffic for certain patterns of NXDomain (non-existent domain) query responses, we can accurately predict DGA-based domain names before they are registered. Given all of these approaches to malicious domain names, we ultimately propose a system called D-FENS (DNS Filtering & Extraction Network System). D-FENS uses machine learning and prior knowledge to accurately predict unreported malicious domain names in real-time, thereby preventing Internet devices from unknowingly connecting to a potentially malicious domain name

    On Frequency Estimation and Detection of Heavy Hitters in Data Streams

    Get PDF
    A stream can be thought of as a very large set of data, sometimes even infinite, which arrives sequentially and must be processed without the possibility of being stored. In fact, the memory available to the algorithm is limited and it is not possible to store the whole stream of data which is instead scanned upon arrival and summarized through a succinct data structure in order to maintain only the information of interest. Two of the main tasks related to data stream processing are frequency estimation and heavy hitter detection. The frequency estimation problem requires estimating the frequency of each item, that is the number of times or the weight with which each appears in the stream, while heavy hitter detection means the detection of all those items with a frequency higher than a fixed threshold. In this work we design and analyze ACMSS, an algorithm for frequency estimation and heavy hitter detection, and compare it against the state of the art ASKETCH algorithm. We show that, given the same budgeted amount of memory, for the task of frequency estimation our algorithm outperforms ASKETCH with regard to accuracy. Furthermore, we show that, under the assumptions stated by its authors, ASKETCH may not be able to report all of the heavy hitters whilst ACMSS will provide with high probability the full list of heavy hitters

    Frequent Elements with Witnesses in Data Streams

    Full text link
    Detecting frequent elements is among the oldest and most-studied problems in the area of data streams. Given a stream of mm data items in {1,2,
,n}\{1, 2, \dots, n\}, the objective is to output items that appear at least dd times, for some threshold parameter dd, and provably optimal algorithms are known today. However, in many applications, knowing only the frequent elements themselves is not enough: For example, an Internet router may not only need to know the most frequent destination IP addresses of forwarded packages, but also the timestamps of when these packages appeared or any other meta-data that "arrived" with the packages, e.g., their source IP addresses. In this paper, we introduce the witness version of the frequent elements problem: Given a desired approximation guarantee α≄1\alpha \ge 1 and a desired frequency d≀Δd \le \Delta, where Δ\Delta is the frequency of the most frequent item, the objective is to report an item together with at least d/αd / \alpha timestamps of when the item appeared in the stream (or any other meta-data that arrived with the items). We give provably optimal algorithms for both the insertion-only and insertion-deletion stream settings: In insertion-only streams, we show that space O~(n+d⋅n1α)\tilde{O}(n + d \cdot n^{\frac{1}{\alpha}}) is necessary and sufficient for every integral 1≀α≀log⁥n1 \le \alpha \le \log n. In insertion-deletion streams, we show that space O~(n⋅dα2)\tilde{O}(\frac{n \cdot d}{\alpha^2}) is necessary and sufficient, for every α≀n\alpha \le \sqrt{n}.Comment: Fixed the statement of Lemma 5.1, introduction update

    Lightweight mutual authentication and privacy preservation schemes for IOT systems.

    Get PDF
    Internet of Things (IoT) presents a holistic and transformative approach for providing services in different domains. IoT creates an atmosphere of interaction between humans and the surrounding physical world through various technologies such as sensors, actuators, and the cloud. Theoretically, when everything is connected, everything is at risk. The rapid growth of IoT with the heterogeneous devices that are connected to the Internet generates new challenges in protecting and preserving user’s privacy and ensuring the security of our lives. IoT systems face considerable challenges in deploying robust authentication protocols because some of the IoT devices are resource-constrained with limited computation and storage capabilities to implement the currently available authentication mechanism that employs computationally expensive functions. The limited capabilities of IoT devices raise significant security and privacy concerns, such as ensuring personal information confidentiality and integrity and establishing end-to-end authentication and secret key generation between the communicating device to guarantee secure communication among the communicating devices. The ubiquity nature of the IoT device provides adversaries more attack surfaces which can lead to tragic consequences that can negatively impact our everyday connected lives. According to [1], authentication and privacy protection are essential security requirements. Therefore, there is a critical need to address these rising security and privacy concerns to ensure IoT systems\u27 safety. This dissertation identifies gaps in the literature and presents new mutual authentication and privacy preservation schemes that fit the needs of resource-constrained devices to improve IoT security and privacy against common attacks. This research enhances IoT security and privacy by introducing lightweight mutual authentication and privacy preservation schemes for IoT based on hardware biometrics using PUF, Chained hash PUF, dynamic identities, and user’s static and continuous biometrics. The communicating parties can anonymously communicate and mutually authenticate each other and locally establish a session key using dynamic identities to ensure the user’s unlinkability and untraceability. Furthermore, virtual domain segregation is implemented to apply security policies between nodes. The chained-hash PUF mechanism technique is implemented as a way to verify the sender’s identity. At first, this dissertation presents a framework called “A Lightweight Mutual Authentication and Privacy-Preservation framework for IoT Systems” and this framework is considered the foundation of all presented schemes. The proposed framework integrates software and hardware-based security approaches that satisfy the NIST IoT security requirements for data protection and device identification. Also, this dissertation presents an architecture called “PUF Hierarchal Distributed Architecture” (PHDA), which is used to perform the device name resolution. Based on the proposed framework and PUF architecture, three lightweight privacy-preserving and mutual authentication schemes are presented. The Three different schemes are introduced to accommodate both stationary and mobile IoT devices as well as local and distributed nodes. The first scheme is designed for the smart homes domain, where the IoT devices are stationary, and the controller node is local. In this scheme, there is direct communication between the IoT nodes and the controller node. Establishing mutual authentication does not require the cloud service\u27s involvement to reduce the system latency and offload the cloud traffic. The second scheme is designed for the industrial IoT domain and used smart poultry farms as a use case of the Industrial IoT (IIoT) domain. In the second scheme, the IoT devices are stationary, and the controller nodes are hierarchical and distributed, supported by machine-to-machine (M2M) communication. The third scheme is designed for smart cities and used IoV fleet vehicles as a use case of the smart cities domain. During the roaming service, the mutual authentication process between a vehicle and the distributed controller nodes represented by the Roadside Units (RSUs) is completed through the cloud service that stores all vehicle\u27s security credentials. After that, when a vehicle moves to the proximity of a new RSU under the same administrative authority of the most recently visited RSU, the two RSUs can cooperate to verify the vehicle\u27s legitimacy. Also, the third scheme supports driver static and continuous authentication as a driver monitoring system for the sake of both road and driver safety. The security of the proposed schemes is evaluated and simulated using two different methods: security analysis and performance analysis. The security analysis is implemented through formal security analysis and informal security analysis. The formal analysis uses the Burrows–Abadi–Needham logic (BAN) and model-checking using the automated validation of Internet security protocols and applications (AVISPA) toolkit. The informal security analysis is completed by: (1) investigating the robustness of the proposed schemes against the well-known security attacks and analyze its satisfaction with the main security properties; and (2) comparing the proposed schemes with the other existing authentication schemes considering their resistance to the well-known attacks and their satisfaction with the main security requirements. Both the formal and informal security analyses complement each other. The performance evaluation is conducted by analyzing and comparing the overhead and efficiency of the proposed schemes with other related schemes from the literature. The results showed that the proposed schemes achieve all security goals and, simultaneously, efficiently and satisfy the needs of the resource-constrained IoT devices

    Conception d'un modÚle architectural collaboratif pour l'informatique omniprésente à la périphérie des réseaux mobiles

    Get PDF
    Le progrĂšs des technologies de communication pair-Ă -pair et sans fil a de plus en plus permis l’intĂ©gration de dispositifs portables et omniprĂ©sents dans des systĂšmes distribuĂ©s et des architectures informatiques de calcul dans le paradigme de l’internet des objets. De mĂȘme, ces dispositifs font l'objet d'un dĂ©veloppement technologique continu. Ainsi, ils ont toujours tendance Ă  se miniaturiser, gĂ©nĂ©ration aprĂšs gĂ©nĂ©ration durant lesquelles ils sont considĂ©rĂ©s comme des dispositifs de facto. Le fruit de ces progrĂšs est l'Ă©mergence de l'informatique mobile collaborative et omniprĂ©sente, notamment intĂ©grĂ©e dans les modĂšles architecturaux de l'Internet des Objets. L’avantage le plus important de cette Ă©volution de l'informatique est la facilitĂ© de connecter un grand nombre d'appareils omniprĂ©sents et portables lorsqu'ils sont en dĂ©placement avec diffĂ©rents rĂ©seaux disponibles. MalgrĂ© les progrĂšs continuels, les systĂšmes intelligents mobiles et omniprĂ©sents (rĂ©seaux, dispositifs, logiciels et technologies de connexion) souffrent encore de diverses limitations Ă  plusieurs niveaux tels que le maintien de la connectivitĂ©, la puissance de calcul, la capacitĂ© de stockage de donnĂ©es, le dĂ©bit de communications, la durĂ©e de vie des sources d’énergie, l'efficacitĂ© du traitement de grosses tĂąches en termes de partitionnement, d'ordonnancement et de rĂ©partition de charge. Le dĂ©veloppement technologique accĂ©lĂ©rĂ© des Ă©quipements et dispositifs de ces modĂšles mobiles s'accompagne toujours de leur utilisation intensive. Compte tenu de cette rĂ©alitĂ©, plus d'efforts sont nĂ©cessaires Ă  la fois dans la conception structurelle tant au matĂ©riel et logiciel que dans la maniĂšre dont il est gĂ©rĂ©. Il s'agit d'amĂ©liorer, d'une part, l'architecture de ces modĂšles et leurs technologies de communication et, d'autre part, les algorithmes d'ordonnancement et d'Ă©quilibrage de charges pour effectuer leurs travaux efficacement sur leurs dispositifs. Notre objectif est de rendre ces modĂšles omniprĂ©sents plus autonomes, intelligents et collaboratifs pour renforcer les capacitĂ©s de leurs dispositifs, leurs technologies de connectivitĂ© et les applications qui effectuent leurs tĂąches. Ainsi, nous avons Ă©tabli un modĂšle architectural autonome, omniprĂ©sent et collaboratif pour la pĂ©riphĂ©rie des rĂ©seaux. Ce modĂšle s'appuie sur diverses technologies de connexion modernes telles que le sans-fil, la radiocommunication pair-Ă -pair, et les technologies offertes par LoPy4 de Pycom telles que LoRa, BLE, Wi-Fi, Radio Wi-Fi et Bluetooth. L'intĂ©gration de ces technologies permet de maintenir la continuitĂ© de la communication dans les divers environnements, mĂȘme les plus sĂ©vĂšres. De plus, ce modĂšle conçoit et Ă©value un algorithme d'Ă©quilibrage de charge et d'ordonnancement permettant ainsi de renforcer et amĂ©liorer son efficacitĂ© et sa qualitĂ© de service (QoS) dans diffĂ©rents environnements. L’évaluation de ce modĂšle architectural montre des avantages tels que l’amĂ©lioration de la connectivitĂ© et l’efficacitĂ© d’exĂ©cution des tĂąches. Advances in peer-to-peer and wireless communication technologies have increasingly enabled the integration of mobile and pervasive devices into distributed systems and computing architectures in the Internet of Things paradigm. Likewise, these devices are subject to continuous technological development. Thus, they always tend to be miniaturized, generation after generation during which they are considered as de facto devices. The success of this progress is the emergence of collaborative mobiles and pervasive computing, particularly integrated into the architectural models of the Internet of Things. The most important benefit of this form of computing is the ease of connecting a large number of pervasive and portable devices when they are on the move with different networks available. Despite the continual advancements that support this field, mobile and pervasive intelligent systems (networks, devices, software and connection technologies) still suffer from various limitations at several levels such as maintaining connectivity, computing power, ability to data storage, communication speeds, the lifetime of power sources, the efficiency of processing large tasks in terms of partitioning, scheduling and load balancing. The accelerated technological development of the equipment and devices of these mobile models is always accompanied by their intensive use. Given this reality, it requires more efforts both in their structural design and management. This involves improving on the one hand, the architecture of these models and their communication technologies, and, on the other hand, the scheduling and load balancing algorithms for the work efficiency. The goal is to make these models more autonomous, intelligent, and collaborative by strengthening the different capabilities of their devices, their connectivity technologies and the applications that perform their tasks. Thus, we have established a collaborative autonomous and pervasive architectural model deployed at the periphery of networks. This model is based on various modern connection technologies such as wireless, peer-to-peer radio communication, and technologies offered by Pycom's LoPy4 such as LoRa, BLE, Wi-Fi, Radio Wi-Fi and Bluetooth. The integration of these technologies makes it possible to maintain the continuity of communication in the various environments, even the most severe ones. Within this model, we designed and evaluated a load balancing and scheduling algorithm to strengthen and improve its efficiency and quality of service (QoS) in different environments. The evaluation of this architectural model shows payoffs such as improvement of connectivity and efficiency of task executions
    corecore