2020
Authors
Carvalho, P; Lima, SR; Sabucedo, LA; Santos Gago, JM; Silva, JMC;
Publication
COMPUTING
Abstract
Monitoring current communication networks and services is an increasingly complex task as a result of a growth in the number and variety of components involved. Moreover, different perspectives on network monitoring and optimisation policies must be considered to meet context-dependent monitoring requirements. To face these demanding expectations, this article proposes a semantic-based approach to support the flexible configuration of context-aware network monitoring, where traffic sampling is used to improve efficiency. Thus, a semantic layer is proposed to provide with a standard and interoperable description of the elements, requirements and relevant features in the monitoring domain. On top of this description, semantic rules are applied to make decisions regarding monitoring and auditing policies in a proactive and context-aware manner. Use cases focusing on traffic accounting and traffic classification as monitoring tasks are also provided, demonstrating the expressiveness of the ontology and the contribution of smart SWRL rules for recommending optimised configuration profiles.
2020
Authors
Dantas, B; Carvalho, P; Lima, SR; Silva, JMC;
Publication
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Abstract
This work studies Tor, an anonymous overlay network used to browse the Internet. Apart from its main purpose, this open-source project has gained popularity mainly because it does not hide its implementation. In this way, researchers and security experts can fully examine and confirm its security requirements. Its ease of use has attracted all kinds of people, including ordinary citizens who want to avoid being profiled for targeted advertisements or circumvent censorship, corporations who do not want to reveal information to their competitors, and government intelligence agencies who need to do operations on the Internet without being noticed. In opposition, an anonymous system like this represents a good testbed for attackers, because their actions are naturally untraceable. In this work, the characteristics of Tor traffic are studied in detail in order to devise an inspection methodology able to improve Tor detection. In particular, this methodology considers as new inputs the observer position in the network, the portion of traffic it can monitor, and particularities of the Tor browser for helping in the detection process. In addition, a set of Snort rules were developed as a proof-of-concept for the proposed Tor detection approach. © Springer Nature Switzerland AG 2020.
2020
Authors
Carvalho, P; Lima, SR; Sabucedo, LA; Santos Gago, JM; Silva, JMC;
Publication
Computing
Abstract
2020
Authors
Dantas, B; Carvalho, P; Lima, SR; Silva, JMC;
Publication
Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 20th International Conference, NEW2AN 2020, and 13th Conference, ruSMART 2020, St. Petersburg, Russia, August 26-28, 2020, Proceedings, Part II
Abstract
2020
Authors
Marques, R; Bouville, C; Santos, LP; Bouatouch, K;
Publication
European Association for Computer Graphics - 37th Annual Conference, EUROGRAPHICS 2016 - Short Papers
Abstract
Bayesian Monte Carlo (BMC) is a promising integration technique which considerably broadens the theoretical tools that can be used to maximize and exploit the information produced by sampling, while keeping the fundamental property of data dimension independence of classical Monte Carlo (CMC). Moreover, BMC uses information that is ignored in the CMC method, such as the position of the samples and prior stochastic information about the integrand, which often leads to better integral estimates. Nevertheless, the use of BMC in computer graphics is still in an incipient phase and its application to more evolved and widely used rendering algorithms remains cumbersome. In this article we propose to apply BMC to a two-level adaptive sampling scheme for illumination integrals. We propose an efficient solution for the second level quadrature computation and show that the proposed method outperforms adaptive quasi-Monte Carlo in terms of image error and high frequency noise. © 2016 The Eurographics Association.
2020
Authors
Johnson, SA; Ferreira, JF; Mendes, A; Cordry, J;
Publication
ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020
Abstract
The choice of password composition policy to enforce on a password-protected system represents a critical security decision, and has been shown to significantly affect the vulnerability of user-chosen passwords to guessing attacks. In practice, however, this choice is not usually rigorous or justifiable, with a tendency for system administrators to choose password composition policies based on intuition alone. In this work, we propose a novel methodology that draws on password probability distributions constructed from large sets of real-world password data which have been filtered according to various password composition policies. Password probabilities are then redistributed to simulate different user password reselection behaviours in order to automatically determine the password composition policy that will induce the distribution of user-chosen passwords with the greatest uniformity, a metric which we show to be a useful proxy to measure overall resistance to password guessing attacks. Further, we show that by fitting power-law equations to the password probability distributions we generate, we can justify our choice of password composition policy without any direct access to user password data. Finally, we present Skeptic - -a software toolkit that implements this methodology, including a DSL to enable system administrators with no background in password security to compare and rank password composition policies without resorting to expensive and time-consuming user studies. Drawing on 205,176,321 passwords across 3 datasets, we lend validity to our approach by demonstrating that the results we obtain align closely with findings from a previous empirical study into password composition policy effectiveness. © 2020 ACM.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.