Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack p...Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.展开更多
Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code err...Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code errors, code conceptual <span style="font-family:Verdana;">assumptions bugs</span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">,</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> etc. Most existing security practices in e-Commerce are</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> dealt with as an auditing activity. They may have policies of security, which are enforced by auditors who enable a particular set of items to be reviewed, but </span><span style="font-family:Verdana;">also fail to find vulnerabilities, which have been established in complianc</span><span style="font-family:Verdana;">e </span><span style="font-family:Verdana;">with application logic. In this paper, we will investigate the problem of business</span><span style="font-family:Verdana;"> logic vulnerability in the component-based rapid development of e-commerce applications while reusing design specification of component. We propose secure application functional processing Logic Security technique for compo</span><span style="font-family:Verdana;">nent-based e-commerce application, based on security requirement of</span><span style="font-family:Verdana;"> e-business </span><span style="font-family:Verdana;">process and security assurance logical component behaviour specification</span><span style="font-family:Verdana;"> ap</span><span style="font-family:Verdana;">proach to formulize and design a solution for business logic vulnerability</span><span style="font-family:Verdana;"> phenomena.</span></span></span></span>展开更多
Smart grids are increasingly dependent on data with the rapid development of communication and measurement.As one of the important data sources of smart grids,phasor measurement unit(PMU)is facing the high risk from a...Smart grids are increasingly dependent on data with the rapid development of communication and measurement.As one of the important data sources of smart grids,phasor measurement unit(PMU)is facing the high risk from attacks.Compared with cyber attacks,global position system(GPS)spoofing attacks(GSAs)are easier to implement because they can be exploited by portable devices,without the need to access the physical system.Therefore,this paper proposes a novel method for pattern recognition of GSA and an additional function of the proposed method is the data correction to the phase angle difference(PAD)deviation.Specifically,this paper analyzes the effect of GSA on PMU measurement and gives two common patterns of GSA,i.e.,the step attack and the ramp attack.Then,the method of estimating the PAD deviation across a transmission line introduced by GSA is proposed,which does not require the line parameters.After obtaining the estimated PAD deviations,the pattern of GSA can be recognized by hypothesis tests and correlation coefficients according to the statistical characteristics of the estimated PAD deviations.Finally,with the case studies,the effectiveness of the proposed method is demonstrated,and the success rate of the pattern recognition and the online performance of the proposed method are analyzed.展开更多
文摘Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.
文摘Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code errors, code conceptual <span style="font-family:Verdana;">assumptions bugs</span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">,</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> etc. Most existing security practices in e-Commerce are</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> dealt with as an auditing activity. They may have policies of security, which are enforced by auditors who enable a particular set of items to be reviewed, but </span><span style="font-family:Verdana;">also fail to find vulnerabilities, which have been established in complianc</span><span style="font-family:Verdana;">e </span><span style="font-family:Verdana;">with application logic. In this paper, we will investigate the problem of business</span><span style="font-family:Verdana;"> logic vulnerability in the component-based rapid development of e-commerce applications while reusing design specification of component. We propose secure application functional processing Logic Security technique for compo</span><span style="font-family:Verdana;">nent-based e-commerce application, based on security requirement of</span><span style="font-family:Verdana;"> e-business </span><span style="font-family:Verdana;">process and security assurance logical component behaviour specification</span><span style="font-family:Verdana;"> ap</span><span style="font-family:Verdana;">proach to formulize and design a solution for business logic vulnerability</span><span style="font-family:Verdana;"> phenomena.</span></span></span></span>
基金supported by the National Key Research and Development Program of China(No.2017YFB0902900,No.2017YFB0902901)National Natural Science Foundation of China(No.51627811,No.51725702)the Fundamental Research Funds for the Central Universities(No.2018ZD01)
文摘Smart grids are increasingly dependent on data with the rapid development of communication and measurement.As one of the important data sources of smart grids,phasor measurement unit(PMU)is facing the high risk from attacks.Compared with cyber attacks,global position system(GPS)spoofing attacks(GSAs)are easier to implement because they can be exploited by portable devices,without the need to access the physical system.Therefore,this paper proposes a novel method for pattern recognition of GSA and an additional function of the proposed method is the data correction to the phase angle difference(PAD)deviation.Specifically,this paper analyzes the effect of GSA on PMU measurement and gives two common patterns of GSA,i.e.,the step attack and the ramp attack.Then,the method of estimating the PAD deviation across a transmission line introduced by GSA is proposed,which does not require the line parameters.After obtaining the estimated PAD deviations,the pattern of GSA can be recognized by hypothesis tests and correlation coefficients according to the statistical characteristics of the estimated PAD deviations.Finally,with the case studies,the effectiveness of the proposed method is demonstrated,and the success rate of the pattern recognition and the online performance of the proposed method are analyzed.