Cyber Attack Detection using Secret Sharing Schemes

被引:0
作者
Chum, Chi Sing [1 ]
Wei, Xinzhou [2 ]
Zhang, Xiaowen [3 ]
机构
[1] CUNY, Comp Sci Dept, Grad Ctr, New York, NY 10016 USA
[2] CUNY, Elect & Telecommun Dept, New York City Coll Technol, Brooklyn, NY USA
[3] CUNY, Comp Sci Dept, Coll Staten Isl, Staten Isl, NY USA
来源
2023 IEEE 9TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD, BIGDATASECURITY, IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, HPSC AND IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY, IDS | 2023年
关键词
cyber attack detection; secret sharing schemes; multifactor authentication; implementation algorithm;
D O I
10.1109/BigDataSecurity-HPSC-IDS58521.2023.00020
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We propose a model along with its algorithm, which can detect suspicious activities and safeguard sensitive information within a complicated infrastructure of an organization based on the secret sharing schemes. The model provides a flexible multifactor authentication methodology to increase the overall security of the system.
引用
收藏
页码:57 / 59
页数:3
相关论文
共 50 条
  • [1] Detection of Cheaters in Vector Space Secret Sharing Schemes
    Carles Padro
    Germán Sáez
    Jorge Luis Villar
    Designs, Codes and Cryptography, 1999, 16 : 75 - 85
  • [2] Detection of cheaters in vector space secret sharing schemes
    Padró, C
    Sáez, G
    Villar, JL
    DESIGNS CODES AND CRYPTOGRAPHY, 1999, 16 (01) : 75 - 85
  • [3] Secret sharing schemes with detection of cheaters for a general access structure
    Cabello, S
    Padró, C
    Sáez, G
    DESIGNS CODES AND CRYPTOGRAPHY, 2002, 25 (02) : 175 - 188
  • [4] Secret sharing schemes with detection of cheaters for a general access structure
    Cabello, S
    Padró, C
    Sáez, G
    FUNDAMENTALS OF COMPUTATION THEORY, 1999, 1684 : 185 - 194
  • [5] Secret Sharing Schemes with Detection of Cheaters for a General Access Structure
    Sergio Cabello
    Carles Padró
    Germán Sáez
    Designs, Codes and Cryptography, 2002, 25 : 175 - 188
  • [6] Achieving secure communication over MANET using secret sharing schemes
    Kei Kobayashi
    Yosuke Totani
    Keisuke Utsu
    Hiroshi Ishii
    The Journal of Supercomputing, 2016, 72 : 1215 - 1225
  • [7] Achieving secure communication over MANET using secret sharing schemes
    Kobayashi, Kei
    Totani, Yosuke
    Utsu, Keisuke
    Ishii, Hiroshi
    JOURNAL OF SUPERCOMPUTING, 2016, 72 (03) : 1215 - 1225
  • [8] Applying secret sharing schemes to service reputation
    Namin, AS
    Wei, RZ
    Shen, WM
    Ghenniwa, H
    PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS 1 AND 2, 2005, : 696 - 703
  • [9] Secret sharing schemes based on extension fields
    Calkavur, Selda
    EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2018, 11 (02): : 410 - 416
  • [10] Threshold changeable secret sharing schemes revisited
    Zhang, Zhifang
    Chee, Yeow Meng
    Ling, San
    Liu, Mulan
    Wang, Huaxiong
    THEORETICAL COMPUTER SCIENCE, 2012, 418 : 106 - 115