Log File Modification Detection and Location Using Fragile Watermark

Size: px
Start display at page:

Download "Log File Modification Detection and Location Using Fragile Watermark"

Transcription

1 Log File Modification Detection and Location Using Fragile Watermark Liang Xu and Huiping Guo Department of Computer Science California State University at Los Angeles Los Angeles, CA, USA Abstract- In this paper, a novel algorithm is proposed to protect the integrity of log files. Unlike other existing schemes, the proposed algorithm can detect and locate any malicious modifications made to the log files. Furthermore, massive deletion of continuous data can be classified and identified. Security analysis shows that the algorithm can detect modifications with high probability which is verified by the experimental results. In real application, the proposed algorithm can be built into the generation procedure of the log files, so no extra process is needed to embed the watermark for the log files. Keywords: log file; modification detection; modification location; fragile watermarking 1. Introduction Nowadays logs are widely used to keep records of valuable information. Some examples are web server logs[1] and database logs[2]. Many log files contain records related to computer security, the concern of log file security has increased greatly because of the ever-increasing threats against systems and networks[3]. Lots of implementations have been created which place a greater emphasis on log file security. Most have been based on a proposed standard, RFC 3195, which was designed specifically to improve the security of syslog[4], a protocol presenting a spectrum of service options for provisioning an event-based logging service over a network. Among these implementations, transmission damage detection and message digest are aimed to protect the integrity of the log files. The transmission damage detection mainly focuses communication security. If log messages are damaged in transit, mechanisms built into the link layer as well as into the IP[5]and UDP[6] protocols will detect the damage and simply discard a damaged packet. When message digest method is used, log file integrity checking involves calculating a message digest for each file and storing the message digest securely to ensure that changes to archived logs are detected. The most commonly used message digest algorithms are MD5 and keyed Secure Hash Algorithm 1 (SHA-1). Although the transmission damage detection and the message digest method detect the modification of the log files, neither of them is able to locate the modifications. Once authentication is detected false, the whole message packet or the whole log file will be discarded. The usability of the log file is rather low once a modification is detected. The algorithm proposed in this paper not only detects any malicious modification but also locate the modifications. Except those located modification areas, the rest of the log file is still trustable. In the case of malicious modification, the usability of the log file is greatly improved. 2. Related Work In paper [7], Dr Guo and her colleagues proposed a novel algorithm of applying fragile watermarking in verifying the integrity of numerical and categorical data streams at the application layer. In their algorithm, watermarks are chained and embedded directly to the least significant digits of data groups to protect the authentication of data streams. Illegal modifications to the watermark embedded data streams can be effectively detected and located. In this paper, we extend Dr Guo s algorithm to the application of log file generation and storage. The algorithm is alternated accordingly to the specific application of log file generation. 3. Proposed Algorithms In our proposed algorithm, fragile watermarks are calculated and embedded on the fly of the generation of log files. No extra process is required for the watermark calculation and embedding. The embedded watermark can detect as well as locate any modifications made to the log file. 3.1 Algorithm assumptions and advantages In the proposed security log file scheme, we assume the log files are in human readable form composed of clear text. Different from numeric data streams which are widely used in multimedia data, most log files are text documents composed of character lines. We consider each separated text line as a single log data element.

2 We also assume a small buffer at the log file generator side which is used to store a group of log file data. As our scheme is group based, we collect the generated log entries in the same order as they are generated into the buffer until they form a complete group. Watermarks are calculated and embedded into the buffered log data, the watermarked data are then written to the log file storage. In this process, watermarks are calculated and embedded at the same stage as log file generation. No extra round of process is required. Our algorithm is designed to detect and locate modifications of log files using fragile watermark. It possesses the following advantages: Distortion free: The embedded watermark does not change the log file content. The information of the log file remains exactly the same meaning after the watermark embedding. Data is not distorted in any means. Invisibility: The embedded watermark does not degrade the perceptual quality of the log file. The watermark embedded log file remains in clear text format and conveys the exact same message as the log file generated without employing our scheme. Actually the marking is barely observable and the embedded watermark is invisible. Blind verification: The original unmarked log data are not - required for watermark verification. Location: The algorithm can detect as well as locate the modification to a log file. Any modifications, including changing, deletion or insertion of log entries, can be narrowed and located to specific groups. 3.2 Watermark embedding Table 1 gives the notations used in watermark embedding algorithm. The algorithm collects continuously the generated log data elements, i.e., log text lines, into a group and embeds the watermark. The watermark embedding mainly consists of two parts of processes, grouping and embedding. For each collected single log data line ei, we compute a secure hash hi. We check whether this data element i is a synchronization point based on its hash value hi. A log data element ei is defined as a synchronization point if and only if hi mod m = = 0 Table 1 Notations e i h i m L H(i) HASH WH W Watermark embedding notations Descriptions A single log data line secure hash of a single log data line Secure parameter Lower bound of the group size Group hash value Secure hash function Watermark hash value extracted watermark Note that throughout the whole algorithm, we trim the log line ei when we compute the secure hash hi. Since we embed the watermark bit at the end of each line as a space for watermark bit 1 and none for watermark bit 0. And whether the last character of a log line is a space will be used to calculate the watermark. The secure parameter m and the lower bound of the group size L decide how the log data elements are grouped. We only consider a group is formed and proceed to the embedding process if the log data element ei is a synchronization point and the number of elements in the group is larger than L. Otherwise, the log data element is buffered until a group is formed. The parameter L, the lower bound of the group size, is set to prevent small groups from forming for security reasons. HASH(H(i-2) H(i-1)) HASH(H(i-1) H(i)) W i-1 W i... Group i-2 Group i-1 Group i Group i+1 data Synchronization point Figure 1. Watermark embedding... As shown is figure 1, the watermark embedding is group based, all data between two synchronization points (providing the group size is larger than L), including the last synchronization point, form a group. A group hash value H(i) is computed on all the individual hash values hi of data elements within the group. Then a watermark W is constructed based on both the previous group hash value H(i-1) and the current group hash value H(i). We cut the length of the watermark (number of bits of the watermark) as the same as the number of data elements in the current group. The watermark is then embedded to the current group of data by inserting a space to the end of the trimmed log element line if the watermark bit is 1. In this way the embedded watermarks are actually chained. Even if a whole group of data is deleted, the deletion is still detectable because of the forward chain.

3 Algorithm 1 Watermark embedding 1: clear buff 2: fillbuff(buff) //See Algorithm 2 3: H0 = getgouphashe(buff) //See Algorithm 3 4: while true do 5: fillbuff(buff) 6: H1 = getgouphash(buff) 7: WatermarkEmbed(buff, H0, H1 ) //See Algorithm 4 8: Write data in buff into log file 9: Clear buff 10: H0 = H1 11: end while Algorithm 2 fillbuffer(buff) 1: k 0 2: while receive an incoming data element e i do 3: buff(k) = e i // collect and buff log element line e i 4: k++ 5: if (e i is a synchronization point) and (k >= L) then 6: return 7: end if 8: end while Algorithm 3 getgrouphash(buff,k) 1: k <-- number of log data elements in buff 2: for each data element e i in buff do 3: h i = HASH( e i ) //log data element line e i is trimmed. 4: end for 5: H = HASH2( h 1, h 2,..., h k) 6: return H Algorithm 4 watermarkembed(buff, H0, H1) 1: WH = HASH2(H 0, H 1 ) 2: k number of data element in buff 3: W = extractbits(wh) //See Algorithm 5 4: for i = 1 to k do 5: if w(i) == 1 then 6: Insert a space at the end of log data element line buff(i) 7: else if w(i) == 0 then 8: Do nothing. 9: end for Algorithm 5 extractbits(wh, k) 1: if length(wh) >= k then 2: W = concatenation of first k selected bits from WH 3: else 4: m = k - length(wh) 5: W = concatenation of WH and extractbits(wh, m) 6: end if 7: return W The above algorithms 1 5 illustrate how the watermark embedding process works. We will need one buffer in the process to collect and temporarily store a group of log data. As shown in algorithm 2, the buffer is filled until the log element line e i is a synchronization point and the current number of element lines in the buffer is not less than L, a group is then formed. Algorithm 3 calculates the hash value h i for each individual element line, and calculates the group hash value based on the hash value h i of all the individual elements in the group. Algorithm 5 extracts the same number of bits as the number of data elements in the group from a given watermark hash value WH, the extracted bits form the watermark to be embedded to the group data. Algorithm 4 computes the watermark hash value based on the group hash value of the previous data group, H 0, and the group hash value of the current group, H 1, watermark is extracted from the resulting watermark hash value and embedded to the current group of data. Algorithm 1 repeats the watermark embedding process infinitely. 3.3 Watermark verification As in the watermark embedding, watermark verification uses synchronization points to group log data elements into a group. A watermark which is constructed from the group hash value of the previous and the current group is checked against the extracted watermark from the current group. If the two watermarks match, no modification will be detected; the preliminary verification value of the current group is true. Table 2 Notations G pv1 pv0 V1 V0 V(-1) Watermark verification notations Descriptions A group Preliminary verification value of the current group G1 Preliminary verification value of the previous group G0 Final verification value of the current group G1 Final verification value of the previous group G0 Final verification value of the group before the previous group, i.e., G(-1) Table 2 gives the notations used in watermark verification algorithm. To verify the integrity of the log file, we need one buffer to collect and temporarily store a current group of data G1; we also need two pointers to point the beginning position and ending position of the previous group G0. The latter is used to locate the modifications made to the previous group. The watermark verification algorithms use the same initial group hash value H 0, secret parameter m, and the group size lower bound L as the watermark embedding algorithms. We also define two verification values here, the preliminary verification value and the final verification value. Notation pv0 indicates the preliminary verification value for the previous group and pv1 indicates the preliminary verification value for the current group; Similarly, V0 denotes the final verification value for the previous group and V1 denotes the final verification value for the current group. V(-1) denotes the final verification value we finalized at an earlier time for the group before the previous group. The preliminary verification value pv for a group, which results from the matching check between the watermark constructed and the watermark extracted, may be different from the final verification result V of that group. The final verification result for a group V indicates wheather the group is authentic. It is decided on the following watermark verification rational table.

4 Table 3 Watermark verification rationale Cases Precondition Rational Results Note pv0 pv1 V(-1) V0 V1 1 true true true true true No modification detected 2 true false true true false 3 false true false true true 4 false true true missing group(s) true true One or more groups may be missing before G0 5 false false true false? V1 to be finalized at next stage using next group G2 6 false false false false? V1 to be finalized at next stage using next group G2 Table 3 shows the rational of watermark verification. Since the watermark embedded in the current group G1 is a chained watermark computed from the value of the previous group G0 and the current group G1, if the watermark constructed from G0 and G1 matches the watermark extracted from G1, a positive preliminary verification result for the current group (pv1 = true) indicates the originality of the previous group data G0 and the current group data G1 (V0 = V1 = true). The situation is more complex if the two watermarks do not match. In this case, we can only say the preliminary verification for the current group is false (pv1 = false). We will still need to investigate the integrity of the next group before ascertaining the final verification result of the current group (forward check). Similarly, the final verification result for the previous group (V0) depends not only on the preliminary value of its own (pv0) but also on the preliminary verification result of the current group (pv1). If the preliminary verification for the current group is positive (pv1 = true), which also indicates a positive verification for the previous group (V0 = true), the false preliminary verification pv0 means either one or more group are missing between the G(-1) and G0, or the false verification result is brought forward from the false verification of G(-1). There are some interesting cases where preliminary verification is false. This may be due to modifications in the previous group or those in the current group, or missing groups. In Table 3, one or more groups are missing before G0 in the case 4. Since in this case the verifications of both the previous group V0 and the group before previous group V(-1) are true, which excludes the possibility of modifications in both G(-1) and G0, the only explanation for the false pv0 is that one or more entire groups between G(- 1) and G0 have been deleted. It is these deletions that cause the preliminary verification of the previous group pv0 to be false. Because watermarks are chained together, no matter how many groups are deleted, the deletions can be correctly detected. Algorithm 6 Watermark verification 1: clear buff 2: pv0,v0, V(-1) true 3: fillbuff(buff) //See Algorithm 2 4: H0 = getgouphash(buff) //See Algorithm 3 5: while true do 6: fillbuff(buff) 7: H1 = getgouphash(buff) //See Algorithm 3 8: WatermarkVerify(buff, H0, H1, pv0, V0, V(-1)) // See Algorithm 7 9: Clear buff 10: H0 H1 11: pv0 pv1 12: V(-1) V0 13: V0 V1 14:end while Algorithm 7 watermarkverify(buff, H0, H1,pV0,V0, V(-1)) 1: WH = HASH(H0,H1) 2: k number of data elements in buff 3: W1 = extractbits(wh, k) //See Algorithm 5 4: for i = 1 to k do 5: if end of log element line buff(i) is a space 6: W2(i) 1 7: else 8: W2(i) 0 9: end for 10: IF (W1 == W2) then 11: V1 = pv1 = V0 = true 12: else 13: pv1 = false 14: V1 = V0 & pv1 15: end if 16: if V0 == false then 17: The previous group may be tampered 18: end if 19: if pv0 == false && V0 == true && V(-1) == true then 20: One or more groups between the previous group and the current group may be missing 21: end if The algorithms 6 and 7 describe the watermark verification process. A group of log data lines are filled into the buffer, the group hash value H1 is computed. Algorithm 7 verifies the watermark extracted from a group of log data through watermark matching. Watermark hash value WH is computed based on the current group hash value H1 and the previous group hash value H0. (For the first group of data, the initial watermark hash value WH0 is introduced.) Watermark W1 is constructed from WH. Meanwhile, watermark W2 is extracted from the group of data lines. If W1 equals to W2, the watermark verification for the current group succeeds and the verification result is set to true; otherwise, the verification fails and a false preliminary verification result is set to the current group. Algorithm 6 repeats the above process for an infinite log file check.

5 4. Implementations To directly create the watermarked security log file, we integrate our watermark embedding mechanism with the logging service. Figure 2 displays the integration structure of integrating watermark embedding mechanism into the log4j logging. Based on this structure, the printing methods of a logger instance in log4j will output the log data to a socket. The watermark embedding mechanism collects the log data element lines from the socket and invokes the watermark embedding method. Thus the watermark embedding process is triggered and the watermarked log data are produced. The watermarked log data stream will finally be written to the predefined destination through the appending method of an appender and the write method of the output stream in log4j. Log4j Logger.printing() Output to socket Appender.appending() Outputstream.write() SOCKET Watermark Embedding Collect stream lines from socket watermarkembedding() Figure 2. Integration with log4j 5. Experimental Results and Conclusion 5.1 Experiment scenarios and results We test the validity of the mechanisms under various scenarios. We choose log files of different types and different sizes and embed watermarks into the log files using the watermark embedding mechanism. Then we modify the watermarked log file in various ways manually or using the log file modification program. The watermark verification mechanism is applied to the manipulated log files to detect and locate the modifications made to the log files Successful verification without modification First, we verify the original watermarked log file without any modification. No modification is detected in this scenario. The verification result turns out to be successful Single data element modification We change, delete or insert a single data element line in the watermarked log file and then run the verification process. The results show that if a regular data line is modified, the modification is easily detected and located to the modified group. If the modified line happens to be a synchronization point (this may happen at a less possibility rate), the grouping of the data is affected, the detection will locate the modification to the group before the synchronization point (including the synchronization point) and the group after the synchronization point Multiple data elements modification We change, delete or insert multiple data element lines in the watermark embedded log file and then run the verification process. The same as single data element modification, if regular data lines (not synchronization points) are modified, as long as the grouping of data is not affected, the modifications are easily detected and located to the modified groups. The detection becomes more complex if the grouping of data is changed because of the modification or change of synchronization points. If the modification is related to synchronization points, the detection mechanism locates the modification to the group before the modified synchronization point (including the synchronization point) and the group after the synchronization point. The experimental results also show that the mechanism is able to detect and locate the modifications when one or more entire groups are deleted or inserted although these cases rarely happen in real world. If the inserted two or more groups are continuous groups with well-embedded watermarks (this can be made by repeating continuous groups of data), the classification for the insertion fails which is mistakenly classified as missing groups. But the mechanism is still able to locate the modification before the inserted group and before the group after. 5.2 Security analysis There is a probability that the log file watermark mechanism fails to detect a modification made to the log file. In the case that the extracted watermark from the modified group happens to match the watermark constructed from the modified group and the group before, the preliminary verification of the modified group will succeed, the modification will not be detected. Assume the size of a group is l, after a modification is made to the group, the probability that the preliminary verification of the group will succeed (i.e., the false negative rate) is as 1/2 l <= 1/2 L L is defined as the lower bound of group size. The group false negative rate monotonically decreases with the value of L. With group size fixed, the false negative rate of any affected group in an attack remains the same no matter how many

6 elements in the group are changed. Therefore, we consider the attack at group level and assume that g groups are affected in attacks. The overall false negative rate, which is the probability that at least one affected group is verified successfully, can be computed as 1- (1-1/2 L ) g The overall false negative rate is monotonic increasing with g and decreasing with L. Providing a relative large L and small g, which is as in most cases in the real world, we can limit the overall false negative rate to a rather small rate. During the experiment, we noticed that the lower bound value of group size (i.e., L) has an impact on the number of affected groups (i.e., g) in simulated attacks. With a smaller L value, there are generally fewer data lines in an average group, the modification of single element and especially multiple data elements is more likely to affect the grouping of data. Thus, with a smaller size for each group, the modification location accuracy for a group increases while more groups may be affected and be located in overall modification locations. 5.3 Performance analysis Table 4 Watermark embedding time Log file size Generation time without watermarking Generation time with watermarking Time difference (watermarking time) 1 KB 2 ms 2 ms KB 5 ms 6 ms 1 ms 12.1 KB 9 ms 11 ms 2 ms 133 KB 43 m 48 ms 5 ms 367 KB 67 ms 74 ms 7 ms 463 KB 74 ms 84 ms 10 ms 1,285 KB 160ms 177 ms 17 ms 6,545 KB 400 ms 450 ms 50 ms 10,241 KB 955 ms 1105 ms 150 ms 27,179 KB 1510 ms 1676 ms 166 ms that the watermarking process doesn t cost much extra time compared to the original log generation. It costs about one tenth more time to generate a watermarked log file than to produce the original log file, which proves the feasibility of the proposed scheme. 5.4 Conclusion This paper gives a naive way to protect the integrity of the log files. According to our scheme, modifications, including change, insertion and deletion, made to a log file can be detected and located to a small group area. The algorithm is described in details. Implementations and experimental results are discussed. We could embed the scheme into the generation procedure of the log files thus no extra process is needed to embed the watermark for the log files. The algorithm can be applied to any text files. For any text files, fragile watermarks can be calculated and embedded, thus any modifications made to the text files can be detected and located to small areas using the watermark verification mechanism described in this paper. 6. References [1] M. Bruce, (1999, Jul.). A Brief Introduction to Server Logs. [Online]. Available: [2] Wikimedia Foundation, Inc., (2011, Feb.). Transaction log. [Online]. Available: [3] K. Kent, M. Souppaya, "Guide to Computer Security Log Management", National Institute of Standards and Technology, Technology Adminstration, U.S. Department of Commerce, Special Publication [4] C. Lonvick, "The BSD Syslog Protocol", RFC 3164, August [5] J. Postel, "Internet Protocol", STD 5, RFC 791, September [6] F. Baker, "Requirements for IP Version 4 Routers", RFC 1812, June With watermarking Without watermarking [7] H. Guo, Y. Li, A. Liu and S. Jajodia, A fragile watermarking scheme for detecting malicious modifications of database relations, Information Sciences, vol. 176, pp , May 2006 Figure 3. Watermark embedding time Table 4 gives approximate time to watermark log files in different sizes using our watermark embedding mechanism. Figure 3 illustrates the time increase chart for the log generation without watermarking and with watermarking as the log file size increases. Both the table and the figure show

Integrity verification for XML data

Integrity verification for XML data Integrity verification for XML data Jules R. Nya Baweu and Huiping Guo Abstract The success of the Internet has made the communication very easy between parties and XML is one of the most used standard

More information

DATA HIDING IN PDF FILES AND APPLICATIONS BY IMPERCEIVABLE MODIFICATIONS OF PDF OBJECT PARAMETERS

DATA HIDING IN PDF FILES AND APPLICATIONS BY IMPERCEIVABLE MODIFICATIONS OF PDF OBJECT PARAMETERS DATA HIDING IN PDF FILES AND APPLICATIONS BY IMPERCEIVABLE MODIFICATIONS OF PDF OBJECT PARAMETERS 1 Jiun-Tsung Wang ( 王竣聰 ) and 2 Wen-Hsiang Tsai ( 蔡文祥 ) 1 Institute of Multimedia Eng., National Chiao

More information

Network-Adaptive Video Coding and Transmission

Network-Adaptive Video Coding and Transmission Header for SPIE use Network-Adaptive Video Coding and Transmission Kay Sripanidkulchai and Tsuhan Chen Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213

More information

Watermark-Based Authentication and Key Exchange in Teleconferencing Systems

Watermark-Based Authentication and Key Exchange in Teleconferencing Systems Watermark-Based Authentication and Key Exchange in Teleconferencing Systems Ulrich Rührmair a, Stefan Katzenbeisser b, Martin Steinebach c, and Sascha Zmudzinski c a Technische Universität München, Department

More information

A Study on Intrusion Detection Techniques in a TCP/IP Environment

A Study on Intrusion Detection Techniques in a TCP/IP Environment A Study on Intrusion Detection Techniques in a TCP/IP Environment C. A. Voglis and S. A. Paschos Department of Computer Science University of Ioannina GREECE Abstract: The TCP/IP protocol suite is the

More information

II. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca

II. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca ROI based Tamper Detection and Recovery for Medical Images Using Reversible Watermarking Technique Osamah M. Al-Qershi, Bee Ee Khoo School of Electrical and Electronic Engineering Universiti Sains Malaysia

More information

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Overview Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message

More information

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

A Smart Card Based Authentication Protocol for Strong Passwords

A Smart Card Based Authentication Protocol for Strong Passwords A Smart Card Based Authentication Protocol for Strong Passwords Chin-Chen Chang 1,2 and Hao-Chuan Tsai 2 1 Department of Computer Science and Information Engineering, Feng Chia University, Taichung, Taiwan,

More information

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing

More information

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION D. AMBIKA *, Research Scholar, Department of Computer Science, Avinashilingam Institute

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 7. Network Security Network Attacks Cryptographic Technologies Message Integrity and Authentication Key Distribution Firewalls Transport Layer

More information

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

High Capacity Reversible Watermarking Scheme for 2D Vector Maps Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration

More information

Detecting Insider Attacks on Databases using Blockchains

Detecting Insider Attacks on Databases using Blockchains Detecting Insider Attacks on Databases using Blockchains Shubham Sharma, Rahul Gupta, Shubham Sahai Srivastava and Sandeep K. Shukla Department of Computer Science and Engineering Indian Institute of Technology,

More information

Catching BlackHole Attacks in Wireless Sensor Networks

Catching BlackHole Attacks in Wireless Sensor Networks Catching BlackHole Attacks in Wireless Sensor Networks Ashish M 1 and Mr. Jason Martis 2 1 M. Tech, Department Of ISE, NMAM Institute of Technology, Nitte 2 Asst. Prof, Department Of ISE, NMAM Institute

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

Category: Standards Track March 2009

Category: Standards Track March 2009 Network Working Group A. Okmianski Request for Comments: 5426 Cisco Systems, Inc. Category: Standards Track March 2009 Status of This Memo Transmission of Syslog Messages over UDP This document specifies

More information

A Flexible Scheme of Self Recovery for Digital Image Protection

A Flexible Scheme of Self Recovery for Digital Image Protection www.ijcsi.org 460 A Flexible Scheme of Self Recoery for Digital Image Protection Zhenxing Qian, Lili Zhao 2 School of Communication and Information Engineering, Shanghai Uniersity, Shanghai 200072, China

More information

Network Working Group. Category: Informational February 1997

Network Working Group. Category: Informational February 1997 Network Working Group K. Hamzeh Request for Comments: 2107 Ascend Communications Category: Informational February 1997 Status of this Memo Ascend Tunnel Management Protocol - ATMP This memo provides information

More information

Part II Authentication Techniques

Part II Authentication Techniques Part II Authentication Techniques Authentication Codes Provides means for ensuring integrity of message Independent of secrecy - in fact sometimes secrecy may be undesirable! Techniques for Authentication

More information

Towards a Telltale Watermarking Technique for Tamper-Proofing

Towards a Telltale Watermarking Technique for Tamper-Proofing Towards a Telltale Watermarking Technique for Tamper-Proofing Deepa Kundur and Dimitrios Hatzinakos 10 King s College Road Department of Electrical and Computer Engineering University of Toronto Toronto,

More information

Joint Entity Resolution

Joint Entity Resolution Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM 109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such

More information

SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION

SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION Chuhong Fei a, Raymond Kwong b, and Deepa Kundur c a A.U.G. Signals Ltd., 73 Richmond St. W, Toronto, ON M4H 4E8 Canada b University of Toronto,

More information

Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme

Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme Y.. Lee Department of Security Technology and Management WuFeng niversity, hiayi, 653, Taiwan yclee@wfu.edu.tw ABSTRAT Due

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

Packet Classification Using Dynamically Generated Decision Trees

Packet Classification Using Dynamically Generated Decision Trees 1 Packet Classification Using Dynamically Generated Decision Trees Yu-Chieh Cheng, Pi-Chung Wang Abstract Binary Search on Levels (BSOL) is a decision-tree algorithm for packet classification with superior

More information

Leveraging Transitive Relations for Crowdsourced Joins*

Leveraging Transitive Relations for Crowdsourced Joins* Leveraging Transitive Relations for Crowdsourced Joins* Jiannan Wang #, Guoliang Li #, Tim Kraska, Michael J. Franklin, Jianhua Feng # # Department of Computer Science, Tsinghua University, Brown University,

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

Transport Layer. The transport layer is responsible for the delivery of a message from one process to another. RSManiaol

Transport Layer. The transport layer is responsible for the delivery of a message from one process to another. RSManiaol Transport Layer Transport Layer The transport layer is responsible for the delivery of a message from one process to another Types of Data Deliveries Client/Server Paradigm An application program on the

More information

Research of Applications in Relational Database on Digital. Watermarking Technology

Research of Applications in Relational Database on Digital. Watermarking Technology International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 9ǁ September 2013 ǁ PP.84-89 Research of Applications in Relational Database on Digital

More information

S. Erfani, ECE Dept., University of Windsor Network Security

S. Erfani, ECE Dept., University of Windsor Network Security 4.11 Data Integrity and Authentication It was mentioned earlier in this chapter that integrity and protection security services are needed to protect against active attacks, such as falsification of data

More information

Available online at ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013)

Available online at  ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013) Available online at www.sciencedirect.com ScienceDirect Procedia Technology 11 ( 2013 ) 614 620 The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013) Reversible Fragile

More information

An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards

An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards Al-Sakib Khan Pathan and Choong Seon Hong Department of Computer Engineering, Kyung Hee University, Korea spathan@networking.khu.ac.kr

More information

A hybrid IP Trace Back Scheme Using Integrate Packet logging with hash Table under Fixed Storage

A hybrid IP Trace Back Scheme Using Integrate Packet logging with hash Table under Fixed Storage Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 12, December 2013,

More information

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Comparison of Wavelet Based Watermarking Techniques for Various Attacks International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-3, Issue-4, April 2015 Comparison of Wavelet Based Watermarking Techniques for Various Attacks Sachin B. Patel,

More information

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM 74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small

More information

Robust Image Watermarking based on DCT-DWT- SVD Method

Robust Image Watermarking based on DCT-DWT- SVD Method Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete

More information

KALASALINGAM UNIVERSITY

KALASALINGAM UNIVERSITY KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLASS NOTES CRYPTOGRAPHY AND NETWOTK SECURITY (CSE 405) Prepared by M.RAJA AP/CSE

More information

Computer Networks Project 4. By Eric Wasserman and Ji Hoon Baik

Computer Networks Project 4. By Eric Wasserman and Ji Hoon Baik Computer Networks Project 4 By Eric Wasserman and Ji Hoon Baik Modifications to the Code, and the Flowcharts UDP transmission is different from TCP transmission in that: 1. UDP transmission is unidirectional;

More information

Relational Database Watermarking for Ownership Protection

Relational Database Watermarking for Ownership Protection Available online at www.sciencedirect.com Procedia Technology 6 (2012 ) 988 995 2nd International Conference on Communication, Computing & Security [ICCCS-2012] Relational Database Watermarking for Ownership

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

New Approach towards Covert Communication using TCP-SQN Reference Model

New Approach towards Covert Communication using TCP-SQN Reference Model ISSN 2278 0211 (Online) New Approach towards Covert Communication using TCP-SQN Reference Model Dhananjay M. Dakhane Department of Computer science & Engineering Sipna College of Engineering & Technology,

More information

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS S. P. Manikandan 1, R. Manimegalai 2 and S. Kalimuthu 3 1 Department of Computer Science and Engineering, Sri Venkateshwara

More information

QoS Provisioning Using IPv6 Flow Label In the Internet

QoS Provisioning Using IPv6 Flow Label In the Internet QoS Provisioning Using IPv6 Flow Label In the Internet Xiaohua Tang, Junhua Tang, Guang-in Huang and Chee-Kheong Siew Contact: Junhua Tang, lock S2, School of EEE Nanyang Technological University, Singapore,

More information

Shim6: Reference Implementation and Optimization

Shim6: Reference Implementation and Optimization Shim6: Reference Implementation and Optimization Jun Bi, Ping Hu, and Lizhong Xie Network Research Center, Tsinghua University, Beijing, 100084, China junbi@tsinghua.edu.cn Abstract. Shim6 is an important

More information

Vol. 1, Issue VIII, Sep ISSN

Vol. 1, Issue VIII, Sep ISSN Enhancing the Security of Image Encryption Algorithms by Adding Timestamp Lini Abraham 1, Neenu Daniel 2 1 M.Tech Student (CSE), Mahatma Gandhi University Viswajyothi College of Engineering and Technology,

More information

TITLE FIELD OF THE INVENTION BACKGROUND OF THE INVENTION

TITLE FIELD OF THE INVENTION BACKGROUND OF THE INVENTION TITLE INFORMATIONAL SECURITY NETWORK FOR EXCHANGE OF RECORDED COMPUTER THREATS AND CONSECUTIVE INTERCEPTION OF VIRUSES AND OTHER COMPUTER ATTACKS ON THE USERS CONNECTED TO THIS NETWORK FIELD OF THE INVENTION

More information

Reversible Data Hiding VIA Optimal Code for Image

Reversible Data Hiding VIA Optimal Code for Image Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering

More information

Switch Configuration message sent 1 (1, 0, 1) 2

Switch Configuration message sent 1 (1, 0, 1) 2 UNIVESITY COLLEGE LONON EPATMENT OF COMPUTE SCIENCE COMP00: Networked Systems Problem Set istributed: nd November 08 NOT ASSESSE, model answers released: 9th November 08 Instructions: This problem set

More information

Network Layer (1) Networked Systems 3 Lecture 8

Network Layer (1) Networked Systems 3 Lecture 8 Network Layer (1) Networked Systems 3 Lecture 8 Role of the Network Layer Application Application The network layer is the first end-to-end layer in the OSI reference model Presentation Session Transport

More information

Ubiquitous One-Time Password Service Using Generic Authentication Architecture

Ubiquitous One-Time Password Service Using Generic Authentication Architecture Ubiquitous One-Time Password Service Using Generic Authentication Architecture Chunhua Chen 1, Chris J. Mitchell 2, and Shaohua Tang 3 1,3 School of Computer Science and Engineering South China University

More information

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security 1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of

More information

A Robust Video Hash Scheme Based on. 2D-DCT Temporal Maximum Occurrence

A Robust Video Hash Scheme Based on. 2D-DCT Temporal Maximum Occurrence A Robust Video Hash Scheme Based on 1 2D-DCT Temporal Maximum Occurrence Qian Chen, Jun Tian, and Dapeng Wu Abstract In this paper, we propose a video hash scheme that utilizes image hash and spatio-temporal

More information

Preliminary Research on Distributed Cluster Monitoring of G/S Model

Preliminary Research on Distributed Cluster Monitoring of G/S Model Available online at www.sciencedirect.com Physics Procedia 25 (2012 ) 860 867 2012 International Conference on Solid State Devices and Materials Science Preliminary Research on Distributed Cluster Monitoring

More information

CS 161 Computer Security

CS 161 Computer Security Popa & Wagner Spring 2016 CS 161 Computer Security Midterm 2 Print your name:, (last) (first) I am aware of the Berkeley Campus Code of Student Conduct and acknowledge that academic misconduct will be

More information

Network Security - ISA 656 Routing Security

Network Security - ISA 656 Routing Security What is? Network Security - ISA 656 Angelos Stavrou What is Routing Security? History of Routing Security Why So Little Work? How is it Different? Bad guys play games with routing protocols. Traffic is

More information

Message Authentication Codes and Cryptographic Hash Functions

Message Authentication Codes and Cryptographic Hash Functions Message Authentication Codes and Cryptographic Hash Functions Readings Sections 2.6, 4.3, 5.1, 5.2, 5.4, 5.6, 5.7 1 Secret Key Cryptography: Insecure Channels and Media Confidentiality Using a secret key

More information

Compression-Compatible Fragile and Semi-Fragile Tamper Detection

Compression-Compatible Fragile and Semi-Fragile Tamper Detection Compression-Compatible Fragile and Semi-Fragile Tamper Detection Lisa M. Marvel George W. Hartwig, Jr. Charles Boncelet, Jr. Presentation by Peter Macko Motivation Direct Applications Establishing credibility

More information

Intelligent Terminal System Based on Trusted Platform Module

Intelligent Terminal System Based on Trusted Platform Module American Journal of Mobile Systems, Applications and Services Vol. 4, No. 3, 2018, pp. 13-18 http://www.aiscience.org/journal/ajmsas ISSN: 2471-7282 (Print); ISSN: 2471-7290 (Online) Intelligent Terminal

More information

Scaling Factors for Process Behavior Charts

Scaling Factors for Process Behavior Charts Quality Digest Daily, Mar. 1, 2010 Manuscript No. 207 Scaling Factors for Process Behavior Charts A Quick Reference Guide In the 1940s the War Production Board trained approximately 50,000 individuals

More information

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com

More information

ROUTING CONSORTIUM. Routing Information Protocol Version 2 (RIP) Multi-System Interoperability Test Suite. Technical Document. Revision 2.

ROUTING CONSORTIUM. Routing Information Protocol Version 2 (RIP) Multi-System Interoperability Test Suite. Technical Document. Revision 2. ROUTING CONSORTIUM Routing Information Protocol Version 2 (RIP) Multi-System Interoperability Test Suite Technical Document Revision 2.2 121 Technology Drive, Suite 2 Durham, NH 03824 Routing Consortium

More information

User Datagram Protocol UDP

User Datagram Protocol UDP 59 User Datagram Protocol UDP Aleksander Malinowski Bradley University Bogdan M. Wilamowski Auburn University 59.1 Introduction... 59-1 59.2 Protocol Operation... 59-1 UDP Datagram Port Number Assignments

More information

A Survey of Fragile Watermarking-based Image Authentication Techniques

A Survey of Fragile Watermarking-based Image Authentication Techniques Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 6, November 2016 A Survey of Fragile Watermarking-based Image Authentication

More information

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by

More information

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark Global Journal of Computer Science and Technology Graphics & Vision Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc.

More information

Network Working Group. November Encoding Long Options in the Dynamic Host Configuration Protocol (DHCPv4)

Network Working Group. November Encoding Long Options in the Dynamic Host Configuration Protocol (DHCPv4) Network Working Group Request for Comments: 3396 Updates: 2131 Category: Standards Track T. Lemon Nominum, Inc. S. Cheshire Apple Computer, Inc. November 2002 Status of this Memo Encoding Long Options

More information

The Research on PGP Private Key Ring Cracking and Its Application

The Research on PGP Private Key Ring Cracking and Its Application The Research on PGP Private Key Ring Cracking and Its Application Xiaoyan Deng 1 *, Qingbing Ji 2, Lijun Zhang 3 1. College of Applied Mathematics,Chengdu University of Information Technology,Chengdu,

More information

Lecture 1 Applied Cryptography (Part 1)

Lecture 1 Applied Cryptography (Part 1) Lecture 1 Applied Cryptography (Part 1) Patrick P. C. Lee Tsinghua Summer Course 2010 1-1 Roadmap Introduction to Security Introduction to Cryptography Symmetric key cryptography Hash and message authentication

More information

TLSnotary - a mechanism for independently audited https sessions

TLSnotary - a mechanism for independently audited https sessions TLSnotary - a mechanism for independently audited https sessions September 10, 2014 1 Abstract TLSnotary allows a client to provide evidence to a third party auditor that certain web traffic occurred between

More information

Network Security - ISA 656 Routing Security

Network Security - ISA 656 Routing Security Network Security - ISA 656 Angelos Stavrou December 4, 2007 What is? What is Routing Security? History of Routing Security Why So Little Work? How is it Different? The Enemy s Goal? Bad guys play games

More information

Santa Barbara, California March In the discussions that follow, byte means 8 bits, with those eight bits numbered 0-7 from left to right.

Santa Barbara, California March In the discussions that follow, byte means 8 bits, with those eight bits numbered 0-7 from left to right. Network Working Group Request for Comments: 105 Category: Informational James E. White Computer Research Lab. University of California Santa Barbara, California March 1971 Network Specifications for Remote

More information

Design and Development of Secure Data Cache Framework. Please purchase PDF Split-Merge on to remove this watermark.

Design and Development of Secure Data Cache Framework. Please purchase PDF Split-Merge on   to remove this watermark. Design and Development of Secure Data Cache Framework CHAPTER 6 DESIGN AND DEVELOPMENT OF A SECURE DATA CACHE FRAMEWORK The nodes of the MANETs act as host and a router without trustworthy gateways. An

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

Image Authentication and Recovery Scheme Based on Watermarking Technique

Image Authentication and Recovery Scheme Based on Watermarking Technique Image Authentication and Recovery Scheme Based on Watermarking Technique KENJI SUMITOMO 1, MARIKO NAKANO 2, HECTOR PEREZ 2 1 Faculty of Information and Computer Engineering The University of Electro-Communications

More information

Big Data Analytics CSCI 4030

Big Data Analytics CSCI 4030 High dim. data Graph data Infinite data Machine learning Apps Locality sensitive hashing PageRank, SimRank Filtering data streams SVM Recommen der systems Clustering Community Detection Queries on streams

More information

III Data Structures. Dynamic sets

III Data Structures. Dynamic sets III Data Structures Elementary Data Structures Hash Tables Binary Search Trees Red-Black Trees Dynamic sets Sets are fundamental to computer science Algorithms may require several different types of operations

More information

Network Working Group. Extreme Networks July Intermediate System to Intermediate System (IS-IS) Cryptographic Authentication

Network Working Group. Extreme Networks July Intermediate System to Intermediate System (IS-IS) Cryptographic Authentication Network Working Group Request for Comments: 3567 Category: Informational T. Li Procket Networks R. Atkinson Extreme Networks July 2003 Status of this Memo Intermediate System to Intermediate System (IS-IS)

More information

Forensic Image Recognition using a Novel Image Fingerprinting and Hashing Technique

Forensic Image Recognition using a Novel Image Fingerprinting and Hashing Technique Forensic Image Recognition using a Novel Image Fingerprinting and Hashing Technique R D Neal, R J Shaw and A S Atkins Faculty of Computing, Engineering and Technology, Staffordshire University, Stafford

More information

CSE 127: Computer Security Cryptography. Kirill Levchenko

CSE 127: Computer Security Cryptography. Kirill Levchenko CSE 127: Computer Security Cryptography Kirill Levchenko October 24, 2017 Motivation Two parties want to communicate securely Secrecy: No one else can read messages Integrity: messages cannot be modified

More information

Stream Control Transmission Protocol (SCTP)

Stream Control Transmission Protocol (SCTP) Stream Control Transmission Protocol (SCTP) Definition Stream control transmission protocol (SCTP) is an end-to-end, connectionoriented protocol that transports data in independent sequenced streams. SCTP

More information

Man in the Middle Attacks and Secured Communications

Man in the Middle Attacks and Secured Communications FEBRUARY 2018 Abstract This document will discuss the interplay between Man in The Middle (MiTM/ MITM) attacks and the security technologies that are deployed to prevent them. The discussion will follow

More information

Data Hiding on Text Using Big-5 Code

Data Hiding on Text Using Big-5 Code Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic

More information

Request for Comments: 304 NIC: 9077 February 17, 1972 Categories: D3, D4, D7 Obsoletes: none Updates: none

Request for Comments: 304 NIC: 9077 February 17, 1972 Categories: D3, D4, D7 Obsoletes: none Updates: none Network Working Group D. B. McKay Request for Comments: 304 IBM NIC: 9077 February 17, 1972 Categories: D3, D4, D7 Obsoletes: none Updates: none Introduction A Data Management System Proposal for the ARPA

More information

NIC #22161 Mar "On a Possible Lockup Condition in the IMP Subnet Due to Message Sequencing"

NIC #22161 Mar On a Possible Lockup Condition in the IMP Subnet Due to Message Sequencing L. Kleinrock (UCLA-NMC) H. Opderbeck (UCLA-NMC) NIC #22161 Mar 1974 "On a Possible Lockup Condition in the IMP Subnet Due to Message Sequencing" Lockup or deadlock conditions are one of the most serious

More information

interface Question 1. a) Applications nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer

interface Question 1. a) Applications  nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer TDTS06 Computer networks, August 23, 2008 Sketched answers to the written examination, provided by Juha Takkinen, IDA, juhta@ida.liu.se. ( Sketched means that you, in addition to the below answers, need

More information

A Correctness Proof for a Practical Byzantine-Fault-Tolerant Replication Algorithm

A Correctness Proof for a Practical Byzantine-Fault-Tolerant Replication Algorithm Appears as Technical Memo MIT/LCS/TM-590, MIT Laboratory for Computer Science, June 1999 A Correctness Proof for a Practical Byzantine-Fault-Tolerant Replication Algorithm Miguel Castro and Barbara Liskov

More information

A Mobile Agent-based Model for Service Management in Virtual Active Networks

A Mobile Agent-based Model for Service Management in Virtual Active Networks A Mobile Agent-based Model for Service Management in Virtual Active Networks Fábio Luciano Verdi and Edmundo R. M. Madeira Institute of Computing, University of Campinas (UNICAMP), Campinas-SP, Brazil

More information

Experimenting with early opportunistic key agreement

Experimenting with early opportunistic key agreement septembre 2002 SÉcurité des Communications sur Internet SECI02 Experimenting with early opportunistic key agreement Catharina Candolin ½ & Janne Lundberg ½ & Pekka Nikander ¾ 1: Laboratory for Theoretical

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based

More information

440GX Application Note

440GX Application Note Overview of TCP/IP Acceleration Hardware January 22, 2008 Introduction Modern interconnect technology offers Gigabit/second (Gb/s) speed that has shifted the bottleneck in communication from the physical

More information

Network Working Group. Category: Standards Track February 2009

Network Working Group. Category: Standards Track February 2009 Network Working Group M. Stapp Request for Comments: 5460 Cisco Systems, Inc. Category: Standards Track February 2009 Status of This Memo DHCPv6 Bulk Leasequery This document specifies an Internet standards

More information

A Propagation Engine for GCC

A Propagation Engine for GCC A Propagation Engine for GCC Diego Novillo Red Hat Canada dnovillo@redhat.com May 1, 2005 Abstract Several analyses and transformations work by propagating known values and attributes throughout the program.

More information

A Robust Watermarking Algorithm For JPEG Images

A Robust Watermarking Algorithm For JPEG Images nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 7) A Robust Watermarking Algorithm For JPEG Images Baosheng Sun, Daofu Gong*, Fenlin Liu *Foundation

More information

Progressive Authentication in ios

Progressive Authentication in ios Progressive Authentication in ios Genghis Chau, Denis Plotnikov, Edwin Zhang December 12 th, 2014 1 Overview In today s increasingly mobile-centric world, more people are beginning to use their smartphones

More information

Request for Comments: 1333 May 1992

Request for Comments: 1333 May 1992 Network Working Group Request for Comments: 1333 W. Simpson Daydreamer May 1992 PPP Link Quality Monitoring Status of this Memo This RFC specifies an IAB standards track protocol for the Internet community,

More information

14. Internet Security (J. Kurose)

14. Internet Security (J. Kurose) 14. Internet Security (J. Kurose) 1 Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer:

More information