Loading...
Search for: bloom-filter
0.005 seconds

    Payload attribution via character dependent multi-bloom filters

    , Article IEEE Transactions on Information Forensics and Security ; Volume 8, Issue 5 , 2013 , Pages 705-716 ; 15566013 (ISSN) Haghighat, M. H ; Tavakoli, M ; Kharrazi, M ; Sharif University of Technology
    2013
    Abstract
    Network forensic analysts employ payload attribution systems (PAS) as an investigative tool, which enables them to store and summarize large amounts of network traffic, including full packet payload. Hence an investigator could query the system for a specific string and check whether any of the packets transmitted previously in the network contained that specific string. As a shortcoming, the previously proposed techniques are unable to support wildcard queries. Wildcards are an important type of query that allow the investigator to locate strings in the payload when only part of the string is known. In this paper, a new data structure for payload attribution, named Character Dependent... 

    An effective payload attribution scheme for cybercriminal detection using compressed bitmap index tables and traffic downsampling

    , Article IEEE Transactions on Information Forensics and Security ; Volume 13, Issue 4 , 2018 , Pages 850-860 ; 15566013 (ISSN) Hosseini, M ; Jahangir, A. H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Payload attribution systems (PAS) are one of the most important tools of network forensics for detecting an offender after the occurrence of a cybercrime. A PAS stores the network traffic history in order to detect the source and destination pair of a certain data stream in case a malicious activity occurs on the network. The huge volume of information that is daily transferred in the network means that the data stored by a PAS must be as compact and concise as possible. Moreover, the investigation of this large volume of data for a malicious data stream must be handled within a reasonable time. For this purpose, several techniques based on storing a digest of traffic using Bloom filters... 

    Provably secure and efficient PUF-based broadcast authentication schemes for smart grid applications

    , Article International Journal of Communication Systems ; Volume 32, Issue 8 , 2019 ; 10745351 (ISSN) Ameri, M. H ; Delavar, M ; Mohajeri, J ; Sharif University of Technology
    John Wiley and Sons Ltd  2019
    Abstract
    Many smart grid applications need broadcast communications. Because of the critical role of the broadcasted messages in these applications, their authentication is very important to prevent message forgery attacks. Smart grid consists of plenty of low-resource devices such as smart meters or phasor measurement units (PMUs) that are located in physically unprotected environments. Therefore, the storage and computational constraints of these devices as well as their security against physical attacks must be considered in designing broadcast authentication schemes. In this paper, we consider two communication models based on the resources of the broadcasters and receivers and propose a physical... 

    Improving Bloom Filters Based Payload Attribution Techniques

    , M.Sc. Thesis Sharif University of Technology Arambam, Farhad (Author) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    The scope of cyber-crime and related complexity is growing rapidly. Keeping a history of communications and exchanged data for analysis is very important and inevitable. Maintenance of data related to history enables the reconstruction of the events that have happened, but storing everything in raw would require large storage. The highly needed volume for storing these data causes great challenges such as very long time for inserting and searching data. Moreover privacy concerns are another problem in this context, so saving all raw data is not possible.Using methods like compressing and hashing can help in solving such problems. Accordingly, Payload Attribution techniques have been proposed... 

    A Trust-based Approach for Correctness Verification of Query Results in Data Outsourcing Scenario

    , M.Sc. Thesis Sharif University of Technology Ghasemi, Simin (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    One of the security issues in database outsourcing scenario is the correctness of the query results. Correctness verification includes integrity, completeness and freshness of the results. Most of the proposed approaches for correctness verification impose high overhead on the components of the scenario which prevents the scenario to implemented in practical applications. In this thesis, we have proposed a probabilistic approach which imposes acceptable overhead for correctness verification of returned results of service provider. The approach uses the previous behavior of the service provider to calculate a trust value toward it which is used to adjust the imposed overhead. In other words,... 

    Efficient scalable multi-party private set intersection using oblivious PRF

    , Article 17th International Workshop on Security and Trust Management, STM 2021, co-located with the 26th European Symposium on Research in Computer Security, ESORICS 2021, 8 October 2021 through 8 October 2021 ; Volume 13075 LNCS , 2021 , Pages 81-99 ; 03029743 (ISSN); 9783030918583 (ISBN) Kavousi, A ; Mohajeri, J ; Salmasizadeh, M ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2021
    Abstract
    In this paper, we present a concretely efficient protocol for private set intersection (PSI) in the multi-party setting using oblivious pseudorandom function (OPRF). In fact, we generalize the approach used in the work of Chase and Miao [CRYPTO 2020] towards deploying a lightweight multi-point OPRF construction for two-party PSI. Our protocol only includes oblivious transfer (OT) extension and garbled Bloom filter as its main ingredients and avoids computationally expensive operations. From a communication pattern perspective, the protocol consists of two types of interactions. The first type is performed over a star-like communication graph in which one designated party interacts with all...