scholarly journals Automated State-Machine-Based Analysis of Hostname Verification in IPsec Implementations

2021 ◽  
Vol 50 (3) ◽  
pp. 570-587
Author(s):  
Jiaxing Guo ◽  
Chunxiang Gu ◽  
Xi Chen ◽  
Siqi Lu ◽  
Fushan Wei

Owing to the advent and rapid development of Internet communication technology, network security protocols with cryptography as their core have gradually become an important means of ensuring secure communications. Among numerous security protocols, certificate authentication is a common method of identity authentication, and hostname verification is a critical but easily neglected process in certificate authentication. Hostname verification validates the identity of a remote target by checking whether the hostname of the communication partner matches any name in the X.509 certificate. Notably, errors in hostname verification may cause security problems with regard to identity authentication. In this study, we use a model-learning method to conduct security testing for hostname verification in internet protocol security (IPsec). This method can analyze the problems entailed in implementing hostname verification in IPsec by effectively inferring the deterministic finite automaton model that can describe the matching situation between the certificate subject name and the hostname for different rules. We analyze two popular IPsec implementations, Strongswan and Libreswan, and find five violations. We use some of these violations to conduct actual attack tests on the IPsec implementation. The results show that under certain conditions, attackers can use these flaws to carry out identity impersonation attacks and man-in-the-middle attacks.

2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Yongyang Lv ◽  
Wenju Liu ◽  
Ze Wang

Based on proxy resignature, the signature transformation between trust domains of different cryptographic systems is realized with the help of the cloud authentication center, so as to achieve cross-domain access between users and cloud service providers in heterogeneous environment. Hierarchical ID tree realizes the uniqueness of identity in communication, and the security of heterogeneous cross-domain identity authentication is enhanced by the two-factor authentication of “password + key” and temporary identity replacing real identity. The security of the scheme is proved under the CK model, which can anonymously trace entity identity, resist replay attacks, replacement attacks, and man-in-the-middle attacks, and the simulation experiment is carried out. By searching it in related fields, no paper on heterogeneous cross-domain identity authentication based on proxy resignature has been published yet. The results of this paper show that the proposed scheme has better computing performance and higher security.


2014 ◽  
Vol 989-994 ◽  
pp. 2349-2355
Author(s):  
Kang Kang Chen ◽  
Chen Lei Cao ◽  
Jian Yi Liu ◽  
Ru Zhang

In Recent years, the rapid development of cloud computing promotes the technological innovation. In the meantime, the security of cloud attracts many researchers. In this paper, a security architecture is proposed to provide a trust communication mechanism between entities in the cloud. Based on this security architecture and BFIBE, three security protocols are proposed to implement mutual authentication and key agreement, which can resist man-in-middle attacks and masquerading attacks. Besides, based the three protocols, an effective data sharing method is proposed.


2019 ◽  
Vol 61 (10) ◽  
pp. 591-596 ◽  
Author(s):  
Yasheng Chang ◽  
Jianmin Gao ◽  
Hongquan Jiang

With the rapid development of industries such as nuclear power and shipbuilding, radiographic testing (RT) is widely used in these fields as an important means of weld inspection. It also produces a large number of radiographic films, which consume a great deal of manpower and material resources. It is therefore beneficial for the radiographic film to be digitised for storage and archiving. Text detection in RT weld images is an important prerequisite for the archiving of digitised films. This paper proposes a novel text detection method that employs mask convolution and frequency-domain filtering, which can detect text at different positions, with different fonts and of different sizes in RT weld images. The method is evaluated using 366 different images and shows significant efficacy for text detection in RT weld images, with the precision value reaching 96%. The method used in this paper is also compared with other methods that are commonly used in other fields and the results show that the proposed method gives improved results compared to state-of-the-art methods.


2012 ◽  
Vol 580 ◽  
pp. 365-368
Author(s):  
Xiao Li ◽  
Jin Hai Zhang

With the rapid development of computer technology and electronic information technology is widely used, and application of computer simulation technology is increasingly popular. Engine room Simulator is a typical application of computer simulation technology in the field of maritime, has become an important means of training, assessment of the majority of the crew. Among them, marine oil separator system is an important part of marine Simulator. Simulation program for marine oil separator system timing control simulation for oil separator, and simulation for common failures.


Author(s):  
Ahmet Gurbuz

Word-of-mouth (WOM) communication, seen as an important subject by researchers and practitioners for a long time, is a process of consumers who provide other customers some information about a product, a service, a brand or a company. If this process takes place on the Internet (e.g. reviews, tweets, blog entries, ‘likes’, images and videos), it is called e-WOM, and it is seen as an important development in contemporary behaviours of consumers. Opinions disappear after a while in offline WOM, but online WOM causes a permanent public opinion. For this reason, e-WOM draws considerable attention from both academics and practitioners. With the rapid development in e-trade, while a growing number of products are sold, these selling are accompanied by a vast variety of customer review and feedbacks. Online customer reviews provide important information about a product, a service, a brand or a company. Analysing and evaluating the WOM are very crucial for helping companies and customers decide. In this research, the effects of e-WOM on buying decisions of consumers are studied. In the research, young consumers, using the online platforms very often, are targeted, the effects of online information sharing on buying, rebuying and replacing behaviours are focused and a questionnaire, implemented on 360 consumers, is interpreted by presenting data obtained from the questionnaire. Keywords: E-wom, word-of-mouth marketing, purchasing decisions, Internet Communication


2014 ◽  
Vol 926-930 ◽  
pp. 4089-4092
Author(s):  
Xin Sun

With the rapid development of international trade,many companies begin to use the electronic mode in trade, orders ,negotiation, contracts, customs clearance, logistics and other business.Information technology could improve efficiency and reduce operating costs.However, for the complexity of international trade business, it is necessary to communicate with many business-oriented management and government departments. Thus, how to deal with cross-border large scale identity authentication between the users and the systems becomes a difficult issue. This paper discusses the cloud certification service platform constructed with the interconnection based on PKI,multi-level authentication and single window service mode and other technologies. The scheme could make full use of the existing infrastructure in transnational trade.


2015 ◽  
Vol 738-739 ◽  
pp. 1323-1327 ◽  
Author(s):  
Jun Ke Song ◽  
Xian Zhong Liu

Rapid development of information technology in education not only leads to great changes in the field of education, but also results in some security risks. How to ensure the safety of teaching resources has become a hot topic in current research in the teaching system with the cloud-terminal integrated digital classroom as scene. In the paper, importance of identity authentication mechanism is proposed by analyzing defects of cloud computing firstly, multiple identity authentication technologies are adopted for privacy protection of data. Features of four technologies, password authentication, smart card authentication, USB key authentication and biometric authentication, are analyzed in details. A set of multiple identity authentication system is designed and realized. The system is designed in Detailed system architecture is designed in the system for improving dynamic password technology and fingerprint recognition technology for ensuring data operation of legitimate users. Mobile terminals should be combined as example, and actual test can be conducted aiming at account recovery, remote data destruction and other demand after unexpected loss of smart terminal equipment. The result shows that the system can ensure accuracy and reliability of account and hardware equipment with excellent test effect.


Author(s):  
Marcus Bertilsson ◽  
Michel Folkemark ◽  
Qingyun Gu ◽  
Viktor Rydberg ◽  
Abdullah Yazar

Smart vehicles have introduced many services which can be categorized by their functionality (infotainment, comfort, ADAS, OEM services). Introducing new services increases the risk of compromising security. A mobile app used by drivers to connect the vehicle could be infected with malware and spread to the vehicle. Forging remote starting signals enables an attacker to start the vehicle without a key. Security implications of these services should be investigated and addressed thoroughly. This chapter investigates such problems and provides an overview of vulnerabilities, attacks, and mitigations related to these services along with findings including software bugs and insecure protocols. The mitigations for these attacks include strengthening the security protocol of the vehicle CAN bus and incorporating security protocols such as TLS and IPsec. It is hard to say that all connected vehicles are secured. In conclusion, security cannot be neglected, and best practices like sufficient logging (e.g., IDS), reviewing, security testing, and updating of software and hardware should be used.


Author(s):  
Yun Xiao

Recent studies on Chinese language use show that the rapid development of Internet communication in China has created a new linguistic variety, Chinese Internet language (CIL). Marked with innovations and catch words, CIL is officially branded as 平民化 pingminhua (‘grassroots,’ ‘ordinary’), 低门槛 dimenkan (‘low-standard,’ ‘vulgar’) (Language Situation in China 2012: 205). Nevertheless, the new usages in CIL have attracted tremendous attention; prominent among them is the usage of 被 bei- XX. In Modern Chinese grammar, bei is a preposition followed by an agent (bei + agent + verb) in passive sentences. However, since the news broke out that Prisoner Li Guofu died in a prison hospital and was announced as “a suicide” by the administration in 2008, the usage of 被自杀 bei zisha (to be presumably murdered) started to appear in the Internet and was soon analogized; consequently, numerous new usages of bei-XX swept through the media like wildfire. Taking the grammaticalization approach (Hopper and Traugott 2003), this study intends to explore the semantic changes, linguistic features, and grammatical role of bei in the bei-XX construction. It examines the historical development of bei in the grammaticalization process and evaluates previous and recent analyses associated with it. Drawing on data from China’s national annual reports entitled 《中国语言生活状况报告》 Language Situation in China (2005 to 2013) and online CIL publications, the study proposes an alternative analysis of bei in the bei-XX construction and predicts that this new bei will become an established prefix in the Chinese language and, further, create large word families with bei-XX as the blueprint.


2014 ◽  
Vol 945-949 ◽  
pp. 3296-3299 ◽  
Author(s):  
Dong Mei Yao ◽  
Deng Ying Jiang

With the rapid development of social economy, China has sped up urbanization and motorization, as thus the intercity rail transport has become an important means to solve the traffic inconvenience. Traffic distribution forecasting is the second stage of Four-Stage Predict Method. To make the trip distribution forecasting fully reflect the impact of socioeconomic and land use, this paper builds a generalized cost calculation model by fitting the areas based on cluster analysis, and the generalized cost is applied to Gravity Model as traffic impedance, which improves the forecast accuracy to some extent. Finally, taking Nanchang-Jiujiang intercity railway as the empirical analysis sample, the result obtained shows the practicality and simplicity of the method.


Sign in / Sign up

Export Citation Format

Share Document