Cyber Attack Detection using Secret Sharing Schemes

被引:0
作者
Chum, Chi Sing [1 ]
Wei, Xinzhou [2 ]
Zhang, Xiaowen [3 ]
机构
[1] CUNY, Comp Sci Dept, Grad Ctr, New York, NY 10016 USA
[2] CUNY, Elect & Telecommun Dept, New York City Coll Technol, Brooklyn, NY USA
[3] CUNY, Comp Sci Dept, Coll Staten Isl, Staten Isl, NY USA
来源
2023 IEEE 9TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD, BIGDATASECURITY, IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, HPSC AND IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY, IDS | 2023年
关键词
cyber attack detection; secret sharing schemes; multifactor authentication; implementation algorithm;
D O I
10.1109/BigDataSecurity-HPSC-IDS58521.2023.00020
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We propose a model along with its algorithm, which can detect suspicious activities and safeguard sensitive information within a complicated infrastructure of an organization based on the secret sharing schemes. The model provides a flexible multifactor authentication methodology to increase the overall security of the system.
引用
收藏
页码:57 / 59
页数:3
相关论文
共 50 条
  • [21] Efficient Explicit Constructions of Multipartite Secret Sharing Schemes
    Chen, Qi
    Tang, Chunming
    Lin, Zhiqiang
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT II, 2019, 11922 : 505 - 536
  • [22] Compartmented Secret Sharing Schemes and Locally Repairable Codes
    Chen, Qi
    Tang, Chunming
    Lin, Zhiqiang
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (10) : 5976 - 5987
  • [23] A Survey of Secret Sharing Schemes Based on Latin Squares
    Tso, Raylin
    Miao, Ying
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT II, 2018, 82 : 267 - 272
  • [24] SECRET SHARING SCHEMES FOR PORTS OF MATROIDS OF RANK 3
    Farras, Oriol
    KYBERNETIKA, 2020, 56 (05) : 903 - 915
  • [25] Efficient explicit constructions of compartmented secret sharing schemes
    Qi Chen
    Chunming Tang
    Zhiqiang Lin
    Designs, Codes and Cryptography, 2019, 87 : 2913 - 2940
  • [26] A Weak Security Notion for Visual Secret Sharing Schemes
    Iwamoto, Mitsugu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 372 - 382
  • [27] Efficient explicit constructions of compartmented secret sharing schemes
    Chen, Qi
    Tang, Chunming
    Lin, Zhiqiang
    DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (12) : 2913 - 2940
  • [28] Probabilistic Secret Sharing Schemes for Multipartite Access Structures
    Wang, Xianfang
    Fu, Fang-Wei
    Guang, Xuan
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (04) : 856 - 862
  • [29] Visual secret sharing schemes for multiple secret images allowing the rotation of shares
    Iwamoto, Mitsugu
    Wang, Lei
    Yoneyama, Kazuki
    Kunihiro, Noboru
    Ohta, Kazuo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (05) : 1382 - 1395
  • [30] ENew generalized secret-sharing schemes with points on a hyperplane using a Wronskian matrix
    Loucks, Weston
    Yildiz, Bahattin
    INVOLVE, A JOURNAL OF MATHEMATICS, 2020, 13 (02): : 257 - 279