Compressing Network Attack Surfaces for Practical Security Analysis

Author(s):  
Douglas Everson ◽  
Long Cheng
2021 ◽  
Vol 257 ◽  
pp. 01006
Author(s):  
Kaicheng Liu ◽  
Ying Guo ◽  
Dan Wang ◽  
Dezhi Li ◽  
Guixiong He

Regional integrated energy system (RIES) can realize multi-energy conversion and complementation so as to improve energy efficiency, which also brings more security risks. The regional integrated energy system security region (RIESSR) is a security analysis method to describe the safe area for the operating points of RIES based on the N-1 guideline. As a controllable device, energy storage (ES) which is installed in the energy hub (EH) plays an important role in improving system security. Therefore, this paper establishes the model of practical security region of RIES integrating energy storage, and studies the impact of ES on total supply capability (TSC) and practical security boundary. Finally, a specific case is set to simulate and verify the model. By comparing the scenario with ES and the scenario without ES, it can be seen that the solution result of TSC increases and the security region extends across quadrant when the RIES is integrated with ES system. The capacity and location of the ES also impact on TSC and RIESSR.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Zenan Wu ◽  
Liqin Tian ◽  
Yi Zhang ◽  
Yan Wang ◽  
Yuquan Du

At present, most network security analysis theory assumes that the players are completely rational. However, this is not consistent with the actual situation. In this paper, based on the effectiveness constraints on both sides with network attack and defense, with the help of stochastic Petri net and evolutionary game theory, the Petri net model of network attack and defense stochastic evolutionary game is reconstructed, the specific definition of the model is given, and the modeling method is given through the network connection relationship and attack and defense strategy set. Using this model, a quantitative analysis of network attack events is carried out to solve a series of indicators related to system security, namely, attack success rate, average attack time, and average system repair time. Finally, the proposed model and analysis method are applied to a classic network attack and defense process for experimental analysis, and the results verify the rationality and accuracy of the model and analysis method.


2019 ◽  
Vol 9 (1) ◽  
Author(s):  
Wei Zhao ◽  
Ronghua Shi ◽  
Duan Huang

AbstractBy manipulating the reference pulses amplitude, a security vulnerability is caused by self-reference continuous-variable quantum key distribution. In this paper, we formalize an attack strategy for reference pulses, showing that the proposed attack can compromise the practical security of CVQKD protocol. In this scheme, before the beam splitter attack, Eve intercepts the reference pulses emitted by Alice, using Bayesian algorithm to estimate phase shifts. Subsequently, other reference pulses are re-prepared and resubmitted to Bob. In simulations, Bayesian algorithm effectively estimates the phase drifts and has the high robustness to noise. Therefore, the eavesdropper can bias the excess noise due to the intercept-resend attack and the beam splitter attack. And Alice and Bob believe that their excess noise is below the null key threshold and can still share a secret key. Consequently, the proposed attack shows that its practical security can be compromised by transmitting the reference pulses in the continuous-variable quantum key distribution protocol.


2021 ◽  
Author(s):  
Ivan S. Sushchev ◽  
Diana M. Guzairova ◽  
Andrey N. Klimov ◽  
Dmitriy A. Dvoretskiy ◽  
Sergey A. Bogdanov ◽  
...  

2020 ◽  
pp. 298-308
Author(s):  
Berik Akhmetov ◽  
Sergiy Gnatyuk ◽  
Vasyl Kinzeryavyy ◽  
Khalicha Yubuzova

In up-to-date information and communication systems (ICS) cryptography is used for ensuring data confidentiality. The symmetric block ciphers (BC) are implemented in different ICS including critical applications. Today theory of analysis and security verification of BC with fixed substitution nodes against linear and differential cryptanalysis (LDC) is developed. There are also BC with substitution nodes defined by round keys. Random substitution nodes improve security of ciphers and complicate its cryptanalysis. But through it all, quantitative assessment is an actual and not simple task as well as the derivation of formulas for practical security verification for BC with random substitution nodes against LDC. In this paper analytical upper bounds of parameters characterized practical security of BC with random substitution nodes against LDC were given. These assessments generalize known analogs on BC with random substitution nodes and give a possibility to verify security improving against LDC. By using the example of BC Kalyna-128, it was shown that the use of random substitution nodes allows improving upper bounds of linear and differential parameters average probabilities in 246 and 290 times respectively. The study is novel as it is one of the few in the cryptology field to calculate analytical upper bounds of BC practical security against LDC methods as well as to show and prove that using random substitutions allows improving upper bounds of linear and differential parameters. The security analysis using quantitative parameters gives possibility to evaluate various BCs or other cryptographic algorithms and their ability to provide necessary and sufficient security level in ICS. A future research study can be directed on improving analytical upper bounds for analyzed LDC in context to practical security against LDC, as well as practical cryptographic security assessment for other BC with random substitutions against LDC and other cryptanalysis methods including quantum cryptanalysis (Shor, Grover, Deutsch-Jozsa algorithms).


Sign in / Sign up

Export Citation Format

Share Document