Cyber Attack Detection using Secret Sharing Schemes

被引:0
作者
Chum, Chi Sing [1 ]
Wei, Xinzhou [2 ]
Zhang, Xiaowen [3 ]
机构
[1] CUNY, Comp Sci Dept, Grad Ctr, New York, NY 10016 USA
[2] CUNY, Elect & Telecommun Dept, New York City Coll Technol, Brooklyn, NY USA
[3] CUNY, Comp Sci Dept, Coll Staten Isl, Staten Isl, NY USA
来源
2023 IEEE 9TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD, BIGDATASECURITY, IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, HPSC AND IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY, IDS | 2023年
关键词
cyber attack detection; secret sharing schemes; multifactor authentication; implementation algorithm;
D O I
10.1109/BigDataSecurity-HPSC-IDS58521.2023.00020
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We propose a model along with its algorithm, which can detect suspicious activities and safeguard sensitive information within a complicated infrastructure of an organization based on the secret sharing schemes. The model provides a flexible multifactor authentication methodology to increase the overall security of the system.
引用
收藏
页码:57 / 59
页数:3
相关论文
共 50 条
  • [31] A Survey of Cyber Attack Detection Systems
    Singh, Shailendra
    Silakari, Sanjay
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (05): : 1 - 10
  • [32] Mutually trusted authority-free secret sharing schemes
    Jackson, WA
    Martin, KM
    OKeefe, CM
    JOURNAL OF CRYPTOLOGY, 1997, 10 (04) : 261 - 289
  • [33] New Audio Secret Sharing schemes with time division technique
    Lin, CC
    Laih, CS
    Yang, CN
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2003, 19 (04) : 605 - 614
  • [34] Secret Sharing Schemes with Three or Four Minimal Qualified Subsets
    Jaume Martí-Farré
    Carles Padró
    Designs, Codes and Cryptography, 2005, 34 : 17 - 34
  • [35] Secret sharing schemes with three or four minimal qualified subsets
    Martí-Farré, J
    Padró, C
    DESIGNS CODES AND CRYPTOGRAPHY, 2005, 34 (01) : 17 - 34
  • [36] A note on secret sharing schemes with three homogeneous access structure
    Marti-Farre, Jaume
    INFORMATION PROCESSING LETTERS, 2007, 102 (04) : 133 - 137
  • [37] Secret Sharing Schemes for (k, n)-Consecutive Access Structures
    Herranz, Javier
    Saez, German
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2018, 2018, 11124 : 463 - 480
  • [38] New constructions of (2,n)-threshold secret sharing schemes using exclusive-OR operations
    Suga, Yuji
    2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 837 - 842
  • [39] Knowledge graph reasoning for cyber attack detection
    Gilliard, Ezekia
    Liu, Jinshuo
    Aliyu, Ahmed Abubakar
    IET COMMUNICATIONS, 2024, 18 (04) : 297 - 308
  • [40] Cyber-Attack Detection for Automotive Cyber-Physical Systems
    Lee, Suyun
    Jung, Sunjae
    Baek, Youngmi
    BUILDSYS'21: PROCEEDINGS OF THE 2021 ACM INTERNATIONAL CONFERENCE ON SYSTEMS FOR ENERGY-EFFICIENT BUILT ENVIRONMENTS, 2021, : 214 - 215