Cyber Attack Detection using Secret Sharing Schemes

被引:0
作者
Chum, Chi Sing [1 ]
Wei, Xinzhou [2 ]
Zhang, Xiaowen [3 ]
机构
[1] CUNY, Comp Sci Dept, Grad Ctr, New York, NY 10016 USA
[2] CUNY, Elect & Telecommun Dept, New York City Coll Technol, Brooklyn, NY USA
[3] CUNY, Comp Sci Dept, Coll Staten Isl, Staten Isl, NY USA
来源
2023 IEEE 9TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD, BIGDATASECURITY, IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, HPSC AND IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY, IDS | 2023年
关键词
cyber attack detection; secret sharing schemes; multifactor authentication; implementation algorithm;
D O I
10.1109/BigDataSecurity-HPSC-IDS58521.2023.00020
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We propose a model along with its algorithm, which can detect suspicious activities and safeguard sensitive information within a complicated infrastructure of an organization based on the secret sharing schemes. The model provides a flexible multifactor authentication methodology to increase the overall security of the system.
引用
收藏
页码:57 / 59
页数:3
相关论文
共 50 条
  • [11] Access structures of hyperelliptic secret sharing schemes
    Yang, Siman
    Wu, Hongfeng
    Lie, Jiyou
    FINITE FIELDS AND THEIR APPLICATIONS, 2016, 37 : 46 - 53
  • [12] Secret sharing schemes based on combinatorial designs
    Song, YJ
    Kurosawa, S
    Satoh, T
    Tsujii, S
    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART III-FUNDAMENTAL ELECTRONIC SCIENCE, 1995, 78 (10): : 20 - 26
  • [13] Robust vector space secret sharing schemes
    Padro, C
    INFORMATION PROCESSING LETTERS, 1998, 68 (03) : 107 - 111
  • [14] Secret Sharing Schemes with General Access Structures
    Liu, Jian
    Mesnager, Sihem
    Chen, Lusheng
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 341 - 360
  • [15] Secret sharing schemes for compartmented access structures
    Wang, Xianfang
    Xiang, Can
    Fu, Fang-Wei
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2017, 9 (05): : 625 - 635
  • [16] ON THE COMPOSITION OF SECRET SHARING SCHEMES RELATED TO CODES
    Marquez-Corbella, I.
    Martinez-Moro, E.
    Suarez-Canedo, E.
    DISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS, 2014, 6 (01)
  • [17] Secret sharing schemes for compartmented access structures
    Xianfang Wang
    Can Xiang
    Fang-Wei Fu
    Cryptography and Communications, 2017, 9 : 625 - 635
  • [18] Secret sharing schemes with bipartite access structure
    Padró, C
    Sáez, G
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (07) : 2596 - 2604
  • [19] CYBER ATTACK DETECTION SYSTEM
    Geetha, V
    Gomathy, C. K.
    INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (05) : 718 - 729
  • [20] Improvement of Secure Communication Method Using Secret Sharing Schemes over MANET
    Kobayashi, Kei
    Totani, Yosuke
    Utsu, Keisuke
    Ishii, Hiroshi
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2015, : 96 - 99