Lecture Notes in Computer Science 6258 CommencedPublicationin1973 FoundingandFormerSeriesEditors: GerhardGoos,JurisHartmanis,andJanvanLeeuwen EditorialBoard DavidHutchison LancasterUniversity,UK TakeoKanade CarnegieMellonUniversity,Pittsburgh,PA,USA JosefKittler UniversityofSurrey,Guildford,UK JonM.Kleinberg CornellUniversity,Ithaca,NY,USA AlfredKobsa UniversityofCalifornia,Irvine,CA,USA FriedemannMattern ETHZurich,Switzerland JohnC.Mitchell StanfordUniversity,CA,USA MoniNaor WeizmannInstituteofScience,Rehovot,Israel OscarNierstrasz UniversityofBern,Switzerland C.PanduRangan IndianInstituteofTechnology,Madras,India BernhardSteffen TUDortmundUniversity,Germany MadhuSudan MicrosoftResearch,Cambridge,MA,USA DemetriTerzopoulos UniversityofCalifornia,LosAngeles,CA,USA DougTygar UniversityofCalifornia,Berkeley,CA,USA GerhardWeikum Max-PlanckInstituteofComputerScience,Saarbruecken,Germany Igor Kotenko Victor Skormin (Eds.) Computer Network Security 5th International Conference on Mathematical Methods, Models and Architectures for ComputerNetworkSecurity,MMM-ACNS2010 St. Petersburg, Russia, September 8-10, 2010 Proceedings 1 3 VolumeEditors IgorKotenko InstitutionoftheRussianAcademyofSciences St.PetersburgInstituteforInformaticsandAutomationofRAS 39,14-thLiniya,St.Petersburg,199178,Russia E-mail:[email protected] VictorSkormin BinghamtonUniversity(SUNYI) Binghamton,NY13902,USA E-mail:[email protected] LibraryofCongressControlNumber:2010931166 CRSubjectClassification(1998):C.2,D.4.6,E.3,K.6.5,K.4,H.4,J.1 LNCSSublibrary:SL5–ComputerCommunicationNetworksand Telecommunications ISSN 0302-9743 ISBN-10 3-642-14705-4SpringerBerlinHeidelbergNewYork ISBN-13 978-3-642-14705-0SpringerBerlinHeidelbergNewYork Thisworkissubjecttocopyright.Allrightsarereserved,whetherthewholeorpartofthematerialis concerned,specificallytherightsoftranslation,reprinting,re-useofillustrations,recitation,broadcasting, reproductiononmicrofilmsorinanyotherway,andstorageindatabanks.Duplicationofthispublication orpartsthereofispermittedonlyundertheprovisionsoftheGermanCopyrightLawofSeptember9,1965, initscurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Violationsareliable toprosecutionundertheGermanCopyrightLaw. springer.com ©Springer-VerlagBerlinHeidelberg2010 PrintedinGermany Typesetting:Camera-readybyauthor,dataconversionbyScientificPublishingServices,Chennai,India Printedonacid-freepaper 06/3180 Preface This volume contains papers presented at the 5th International Conference on Mathe- matical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010) held in St. Petersburg, Russia, during September 8-10, 2010. The conference was organized by the Institution of the Russian Academy of Sciences St. Petersburg Institute for Informatics and Automation of RAS (SPIIRAS) in coop- eration with Binghamton University (SUNY). The previous conferences in the series (MMM-ACNS 2001, MMM-ACNS 2003, MMM-ACNS 2005 and MMM-ACNS 2007) organized by SPIIRAS and Binghamton University (SUNY) demonstrated the great interest of the international scientific community in the theoretical and practical aspects of computer network and information security. MMM-ACNS 2010 provided the next international forum for sharing original re- search results among specialists in fundamental and applied problems of computer network security. A total of 54 papers from 19 countries related to significant aspects of the theory and applications of computer network and information security were submitted to MMM-ACNS 2010: 16 papers were selected for regular and 6 for short presentations (30% of acceptance for full papers and 40% for all papers). Six technical sessions were organized, namely: security modeling and covert chan- nels; security policies and formal analysis of security properties; authentication, authorization, access control and public key cryptography; intrusion and malware detection; security of multi-agent systems and software protection; adaptive security, security analysis and virtualization. The MMM-ACNS 2010 program was enriched by papers presented by five distinguished invited speakers: Hervé Debar (Institut Tele- com – Telecom SudParis, France), Dieter Gollmann (Technical University of Ham- burg-Harburg, Germany), Greg Morrisett (Harvard University, USA), Bart Preneel (Katholieke Universiteit Leuven, Belgium), and Ravi Sandhu (University of Texas at San Antonio, USA). The success of the conference was assured by the team effort of the sponsors, organizers, reviewers and participants. We would like to acknowledge the contribution of the individual Program Committee members and thank the paper reviewers. Our sincere gratitude goes to the participants of the conference and all authors of the sub- mitted papers. We are grateful to our sponsor, the European Office of Aerospace Research and Development (EOARD) of the US Air Force, the US Office of Naval Research Global (ONRGlobal), and the Russian Foundation for Basic Research, for their generous support. We wish to express our gratitude to the Springer LNCS team managed by Alfred Hofmann for their help and cooperation. September 2010 Igor Kotenko Victor Skormin Organization General Chairs Rafael M. Yusupov Institution of the Russian Academy of Sciences St. Petersburg Institute for Informatics and Automation of RAS (SPIIRAS), Russia Robert L. Herklotz US Air Force Office of Scientific Research, USA Program Committee Co-chairs Igor Kotenko Institution of the Russian Academy of Sciences St. Petersburg Institute for Informatics and Automation of RAS (SPIIRAS), Russia Victor Skormin Binghamton University, USA Program Committee Mikhail Atallah Purdue University, USA Fabrizio Baiardi University of Pisa, Italy Cataldo Basile Politecnico di Torino, Italy Konstantin Beznosov University of British Columbia, Canada Julien Bourgeois University of Franche-Comte, France Mariano Ceccato Fondazione Bruno Kessler, Italy David Chadwick University of Kent, UK Shiu-Kai Chin Syracuse University, USA Howard Chivers Cranfield University, UK Christian Collberg University of Arizona, USA Miguel Correia University of Lisbon, Portugal Frédéric Cuppens TELECOM Bretagne, France Dipankar Dasgupta University of Memphis, USA Hervé Debar Institut Telecom - Telecom SudParis, France Changyu Dong Imperial College London, UK Dennis Gamayunov Moscow State University, Russia Dieter Gollmann Technical University of Hamburg-Harburg, Germany Stefanos Gritzalis University of the Aegean, Greece Alexander Grusho Moscow State University, Russia Amir Herzberg Bar Ilan University, Israel Ming-Yuh Huang Northwest Security Institute, USA Sushil Jajodia George Mason University, USA Angelos Keromytis Columbia University, USA VIII Organization Victor Korneev Federal Enterprise “R&D Institute “Kvant”, Russia Klaus-Peter Kossakowski Presecure Consulting GmbH, Germany Igor Kotenko SPIIRAS, Russia Pavel Laskov University of Tuebingen, Germany Javier Lopez University of Malaga, Spain Antonio Maña University of Malaga, Spain Fabio Martinelli CNR/IIT, Italy Gregorio Martinez University of Murcia, Spain Catherine Meadows Naval Research Laboratory, USA Ann Miller University of Missouri – Rolla, USA Nikolay Moldovyan SPIIRAS, Russia Wojciech Molisz Gdansk University of Technology, Poland Monika Oit Cybernetica, Estonia Vladimir Oleshchuk University of Agder, Norway Slobodan Petrovic Gjøvik University College, Norway Neeli Prasad Aalborg University, Denmark Bart Preneel Katholieke Universiteit Leuven, Belgium Roland Rieke Fraunhofer Institute for Secure Information Technology SIT, Germany Peter Ryan University of Luxembourg, Luxembourg Andrei Sabelfeld Chalmers University of Technology, Sweden Igor Saenko SPIIRAS, Russia Ravi Sandhu George Mason University and NSD Security, USA Victor Skormin Binghamton University, USA Michael Smirnov Fraunhofer-Gesellschaft Institute FOKUS, Germany Artem Tishkov SPIIRAS, Russia Bill Tsoumas Athens University of Economics and Business, Greece Shambhu Upadhyaya Buffalo University, USA Alfonso Valdes SRI International, USA Vijay Varadharajaran Macquarie University, Australia Valery Vasenin Moscow State University, Russia Paulo Verissimo University of Lisbon, Portugal Peter Zegzhda St. Petersburg Polytechnical University, Russia Cliff Zou University of Central Florida, USA Reviewers Mikhail Atallah Purdue University, USA Fabrizio Baiardi University of Pisa, Italy Cataldo Basile Politecnico di Torino, Italy Konstantin Beznosov University of British Columbia, Canada Julien Bourgeois University of Franche-Comte, France Mariano Ceccato Fondazione Bruno Kessler, Italy David Chadwick University of Kent, UK Shiu-Kai Chin Syracuse University, USA Howard Chivers Cranfield University, UK Organization IX Christian Collberg University of Arizona, USA Miguel Correia University of Lisbon, Portugal Frédéric Cuppens TELECOM Bretagne, France Dipankar Dasgupta University of Memphis, USA Hervé Debar Institut Telecom - Telecom SudParis, France Pierpaolo Degano University of Pisa, Italy Changyu Dong Imperial College London, UK Dennis Gamayunov Moscow State University, Russia Dieter Gollmann Technical University of Hamburg-Harburg, Germany Stefanos Gritzalis University of the Aegean, Greece Alexander Grusho Moscow State University, Russia Amir Herzberg Bar Ilan University, Israel Ming-Yuh Huang Northwest Security Institute, USA Sushil Jajodia George Mason University, USA Karthick Jayaraman Syracuse University, USA Angelos Keromytis Columbia University, USA Markulf Kohlweiss Katholieke Universiteit Leuven, Belgium Victor Korneev Federal Enterprise “R&D Institute “Kvant”, Russia Klaus-Peter Kossakowski Presecure Consulting GmbH, Germany Nicolai Kuntze Fraunhofer Institute for Secure Information Technology SIT, Germany Pavel Laskov University of Tuebingen, Germany Antonio Maña University of Malaga, Spain Fabio Martinelli CNR/IIT, Italy Gregorio Martinez University of Murcia, Spain John McDermott Naval Research Laboratory, USA Catherine Meadows Naval Research Laboratory, USA Nikolay Moldovyan SPIIRAS, Russia Wojciech Molisz Gdansk University of Technology, Poland Monika Oit Cybernetica, Estonia Vladimir Oleshchuk University of Agder, Norway Slobodan Petrovic Gjøvik University College, Norway Neeli Prasad Aalborg University, Denmark Bart Preneel Katholieke Universiteit Leuven, Belgium Willard Thor Rafnsson Chalmers University of Technology, Sweden Roland Rieke Fraunhofer Institute for Secure Information Technology SIT, Germany Alejandro Russo Chalmers University of Technology, Sweden Peter Ryan University of Luxembourg, Luxembourg Andrei Sabelfeld Chalmers University of Technology, Sweden Igor Saenko SPIIRAS, Russia Ravi Sandhu George Mason University and NSD Security, USA Michael Smirnov Fraunhofer-Gesellschaft Institute FOKUS, Germany Zaharina Stoynova Fraunhofer Institute for Secure Information Technology SIT, Germany Artem Tishkov SPIIRAS, Russia Bill Tsoumas Athens University of Economics and Business, Greece X Organization Shambhu Upadhyaya University at Buffalo, USA Alfonso Valdes SRI International, USA Valery Vasenin Moscow State University, Russia Paulo Verissimo University of Lisboa, Portugal Peter Zegzhda St. Petersburg Polytechnical University, Russia Cliff Zou University of Central Florida, USA Table of Contents Invited Papers Service Dependencies in Information Systems Security ................ 1 Herv´e Debar, Nizar Kheir, Nora Cuppens-Boulahia, and Fr´ed´eric Cuppens Secure Applications without Secure Infrastructures................... 21 Dieter Gollmann Integrating Types and Specifications for Secure Software Development .................................................... 32 Greg Morrisett Cryptography for Network Security: Failures, Successes and Challenges ...................................................... 36 Bart Preneel Group-Centric Models for Secure and Agile Information Sharing ....... 55 Ravi Sandhu, Ram Krishnan, Jianwei Niu, and William H. Winsborough Security Modeling and Covert Channels A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors .................................... 70 Leonid Domnitser, Nael Abu-Ghazaleh, and Dmitry Ponomarev Attack and Defense Modeling with BDMP .......................... 86 Ludovic Pi`etre-Cambac´ed`es and Marc Bouissou QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems ........................................................ 102 Vidyaraman Sankaranarayanan, Shambhu Upadhyaya, and Kevin Kwiat Problems of Modeling in the Analysis of Covert Channels ............. 118 Alexander Grusho, Nikolai Grusho, and Elena Timonina Security Policies and Formal Analysis of Security Properties Policy-BasedDesign and Verification for Mission Assurance ........... 125 Shiu-Kai Chin, Sarah Muccio, Susan Older, and Thomas N.J. Vestal XII Table of Contents Using Equivalence Relations for Corrective Enforcement of Security Policies ......................................................... 139 Rapha¨el Khoury and Nadia Tawbi Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus ................................. 155 Devrim Unal, Ozan Akar, and M. Ufuk Caglayan Authentication, Authorization, Access Control and Public Key Cryptography Credentials Management for High-Value Transactions................. 169 Glenn Benson, Shiu-Kai Chin, Sean Croston, Karthick Jayaraman, and Susan Older A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols .......................................... 183 Dmitriy N. Moldovyan and Nikolay A. Moldovyan Credential Chain Discovery in RTT Trust Management Language ...... 195 Krzysztof Sacha Genetic Optimization of Access Control Schemes in Virtual Local Area Networks ....................................................... 209 Igor Saenko and Igor Kotenko Intrusion and Malware Detection Intellectual Intrusion Detection with Sequences Alignment Methods .... 217 Yaroslav A. Markov and Maxim O. Kalinin Symptoms-Based Detection of Bot Processes ........................ 229 Jose Andre Morales, Erhan Kartaltepe, Shouhuai Xu, and Ravi Sandhu A Comparison of Feature-Selection Methods for Intrusion Detection .... 242 Hai Thanh Nguyen, Slobodan Petrovi´c, and Katrin Franke From NLP (Natural Language Processing)to MLP (Machine Language Processing) ..................................................... 256 Peter Teufl, Udo Payer, and Guenter Lackner Security of Multi-agent Systems and Software Protection Secure Multi-Agent System for Multi-Hop Environments.............. 270 Stefan Kraxberger, Peter Danner, and Daniel Hein
Description: