244 research outputs found

    Automated Website Fingerprinting through Deep Learning

    Full text link
    Several studies have shown that the network traffic that is generated by a visit to a website over Tor reveals information specific to the website through the timing and sizes of network packets. By capturing traffic traces between users and their Tor entry guard, a network eavesdropper can leverage this meta-data to reveal which website Tor users are visiting. The success of such attacks heavily depends on the particular set of traffic features that are used to construct the fingerprint. Typically, these features are manually engineered and, as such, any change introduced to the Tor network can render these carefully constructed features ineffective. In this paper, we show that an adversary can automate the feature engineering process, and thus automatically deanonymize Tor traffic by applying our novel method based on deep learning. We collect a dataset comprised of more than three million network traces, which is the largest dataset of web traffic ever used for website fingerprinting, and find that the performance achieved by our deep learning approaches is comparable to known methods which include various research efforts spanning over multiple years. The obtained success rate exceeds 96% for a closed world of 100 websites and 94% for our biggest closed world of 900 classes. In our open world evaluation, the most performant deep learning model is 2% more accurate than the state-of-the-art attack. Furthermore, we show that the implicit features automatically learned by our approach are far more resilient to dynamic changes of web content over time. We conclude that the ability to automatically construct the most relevant traffic features and perform accurate traffic recognition makes our deep learning based approach an efficient, flexible and robust technique for website fingerprinting.Comment: To appear in the 25th Symposium on Network and Distributed System Security (NDSS 2018

    Introduction to the thematic issue on Intelligent systems, applications and environments for the industry of the future

    Get PDF
    Recent advances in the area of ubiquitous computing, ambient intelligence and intelligent environments are making inroads in business-oriented application domains. This issue of JAISE addresses core topics on the design, use and evaluation of smart applications and systems for the factory of the future, an emerging trend perhaps better known as Industry 4.0. The digital transformation in the enterprise envisioned by Industry 4.0 will entwine the cyber-physical world and real world of manufacturing to deliver networked production with enhanced process transparency. Production systems, data analytics and cloud-enabled business processes will interact directly with customers to realize the ambitious goal of single lot individualized manufacturing. This thematic issue features a survey and 5 research articles which address the modeling, designing, implementation, assessment and management of intelligent systems, applications and environments that will shape and advance the smart industry of the future.status: publishe

    Efficiency and Security of Process Transparency in Production Networks - A View of Expectations, Obstacles and Potentials

    Get PDF
    Much of the resilience and flexibility of production networks lies in the transparency of processes that allows timely perception of actual process states and adequate decisions or intervention at the proper point of the production system. Such degree of observability and permeability do, however, bear risks of malevolent tapping or interference with the information stream which, in the case of production systems, can put both business and physical processes at risk, requiring careful exploration of security threats in horizontal and vertical integration, and individual end-to-end connections likewise. Also, different levels of networked production present specific needs—high throughput and low time lag on the shop-floor level, or tolerances for confidence, gambling and bounded-rational views in cross-company relations—that may conflict with security policies. The paper presents a systematic summary of such apparently contradicting preferences, and possible approaches of reconciliation currently perceived to be relevant on various abstraction levels of production networks.status: publishe

    Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities

    Get PDF
    Authentication and authorization are critical security layers to protect a wide range of online systems, services and content. However, the increased prevalence of wearable and mobile devices, the expectations of a frictionless experience and the diverse user environments will challenge the way users are authenticated. Consumers demand secure and privacy-aware access from any device, whenever and wherever they are, without any obstacles. This paper reviews emerging trends and challenges with frictionless authentication systems and identifies opportunities for further research related to the enrollment of users, the usability of authentication schemes, as well as security and privacy trade-offs of mobile and wearable continuous authentication systems.Comment: published at the 11th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017

    Data Modeling for Ambient Home Care Systems

    Get PDF
    Ambient assisted living (AAL) services are usually designed to work on the assumption that real-time context information about the user and his environment is available. Systems handling acquisition and context inference need to use a versatile data model, expressive and scalable enough to handle complex context and heterogeneous data sources. In this paper, we describe an ontology to be used in a system providing AAL services. The ontology reuses previous ontologies and models the partners in the value chain and their service offering. With our proposal, we aim at having an effective AAL data model, easily adaptable to specific domain needs and services

    PIVOT:Private and effective contact tracing

    Get PDF
    We propose, design, and evaluate PIVOT, a privacy-enhancing and effective contact tracing solution that aims to strike a balance between utility and privacy: one that does not collect sensitive information yet allowing effective tracing and notifying the close contacts of diagnosed users. PIVOT requires a considerably lower degree of trust in the entities involved compared to centralised alternatives while retaining the necessary utility. To protect users\u27 privacy, it uses local proximity tracing based on broadcasting and recording constantly changing anonymous public keys via short-range communication. These public keys are used to establish a shared secret key between two people in close contact. The three keys (i.e., the two public keys and the established shared key) are then used to generate two unique per-user-per-contact hashes: one for infection registration and one for exposure score query. These hashes are never revealed to the public. To improve utility, user exposure score computation is performed centrally, which provides health authorities with minimal, yet insightful and actionable data. Data minimisation is achieved by the use of per-user-per-contact hashes and by enforcing role separation: the health authority act as a mixing node, while the matching between reported and queried hashes is outsourced to a third entity, an independent matching service. This separation ensures that out-of-scope information, such as users\u27 social interactions, is hidden from the health authorities, whereas the matching service does not learn users\u27 sensitive information. To sustain our claims, we conduct a practical evaluation that encompasses anonymity guarantees and energy requirements

    Policy reconciliation for access control in dynamic cross-enterprise collaborations

    Get PDF
    In dynamic cross-enterprise collaborations, different enterprises form a – possibly temporary – business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.status: publishe

    K8-Scalar: a workbench to compare autoscalers for container-orchestrated services (Artifact)

    Get PDF
    This artifact is an easy-to-use and extensible workbench exemplar, named K8-Scalar, which allows researchers to implement and evaluate different self-adaptive approaches to autoscaling container-orchestrated services. The workbench is based on Docker, a popular technology for easing the deployment of containerized software that also has been positioned as an enabler for reproducible research. The workbench also relies on a container orchestration framework: Kubernetes (K8s), the de-facto industry standard for orchestration and monitoring of elastically scalable container-based services. Finally, it integrates and extends Scalar, a generic testbed for evaluating the scalability of large-scale systems with support for evaluating the performance of autoscalers for database clusters. The associated scholarly paper presents (i) the architecture and implementation of K8-Scalar and how a particular autoscaler can be plugged in, (ii) sketches the design of a Riemann-based autoscaler for database clusters, (iii) illustrates how to design, setup and analyze a series of experiments to configure and evaluate the performance of this autoscaler for a particular database (i.e., Cassandra) and a particular workload type, (iv) and validates the effectiveness of K8-scalar as a workbench for accurately comparing the performance of different auto-scaling strategies. Future work includes extending K8-Scalar with an improved research data management repository

    Robust Digital Twin Compositions for Industry 4.0 Smart Manufacturing Systems

    Get PDF
    Industry 4.0 is an emerging business paradigm that is reaping the benefits of enabling technologies driving intelligent systems and environments. By acquiring, processing and acting upon various kinds of relevant context information, smart automated manufacturing systems can make well-informed decisions to adapt and optimize their production processes at runtime. To manage this complexity, the manufacturing world is proposing the ‘Digital Twin’ model to represent physical products in the real space and their virtual counterparts in the virtual space, with data connections to tie the virtual and real products together for an augmented view of the manufacturing workflow. The benefits of such representations are simplified process simulations and efficiency optimizations, predictions, early warnings, etc. However, the robustness and fidelity of digital twins are a critical concern, especially when independently developed production systems and corresponding digital twins interfere with one another in a manufacturing workflow and jeopardize the proper behavior of production systems. We therefore evaluate the addition of safeguards to digital twins for smart cyber-physical production systems (CPPS) in an Industry 4.0 manufacturing workflow in the form of feature toggles that are managed at runtime by software circuit breakers. Our evaluation shows how these improvements can increase the robustness of interacting digital twins by avoiding local errors from cascading through the distributed production or manufacturing workflow.status: publishe
    • …
    corecore