Cyber Attack Detection using Secret Sharing Schemes

被引:0
作者
Chum, Chi Sing [1 ]
Wei, Xinzhou [2 ]
Zhang, Xiaowen [3 ]
机构
[1] CUNY, Comp Sci Dept, Grad Ctr, New York, NY 10016 USA
[2] CUNY, Elect & Telecommun Dept, New York City Coll Technol, Brooklyn, NY USA
[3] CUNY, Comp Sci Dept, Coll Staten Isl, Staten Isl, NY USA
来源
2023 IEEE 9TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD, BIGDATASECURITY, IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, HPSC AND IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY, IDS | 2023年
关键词
cyber attack detection; secret sharing schemes; multifactor authentication; implementation algorithm;
D O I
10.1109/BigDataSecurity-HPSC-IDS58521.2023.00020
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We propose a model along with its algorithm, which can detect suspicious activities and safeguard sensitive information within a complicated infrastructure of an organization based on the secret sharing schemes. The model provides a flexible multifactor authentication methodology to increase the overall security of the system.
引用
收藏
页码:57 / 59
页数:3
相关论文
共 50 条
  • [41] An Active Distributed Approach for Cyber Attack Detection
    Hoa Dinh Nguyen
    Gutta, Sandeep
    Cheng, Qi
    2010 CONFERENCE RECORD OF THE FORTY FOURTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS (ASILOMAR), 2010, : 1540 - 1544
  • [42] A case study for cyber-attack detection using quantum variational circuits
    Maximilian Moll
    Leonhard Kunczik
    Quantum Machine Intelligence, 2025, 7 (1)
  • [43] Some new signature schemes and secret sharing schemes based on the Gröbner basis cryptosystems
    Li, Hengyan
    Chang, Shuizhen
    Xu, Zhonghai
    Journal of Computational Information Systems, 2013, 9 (13): : 5133 - 5140
  • [44] The Development of Secure Mobile Computing Network Based on Secret Sharing Schemes
    Chervyakov, Nikolay Ivanovich
    Babenko, Mikhail Grigorievich
    Deryabin, Maxim Anatolievich
    Shabalina, Maria Nikolaevna
    Alassane, B. A.
    PROCEEDINGS OF THE 2016 IEEE NORTH WEST RUSSIA SECTION YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING CONFERENCE (ELCONRUSNW), 2016, : 180 - 184
  • [45] Secret sharing schemes on access structures with intersection number equal to one
    Martí-Farré, J
    Padró, C
    SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 354 - 363
  • [46] Linear codes from perfect nonlinear mappings and their secret sharing schemes
    Carlet, C
    Ding, CS
    Yuan, J
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (06) : 2089 - 2102
  • [47] Three-level secret sharing schemes from the twisted cubic
    Giulietti, Massimo
    Vincenti, Rita
    DISCRETE MATHEMATICS, 2010, 310 (22) : 3236 - 3240
  • [48] Constructing perfect secret sharing schemes for general and uniform access structures
    Sun, HM
    Shieh, SP
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 1999, 15 (05) : 679 - 689
  • [49] Strongly secure ramp secret sharing schemes for general access structures
    Iwamoto, M
    Yamamoto, H
    INFORMATION PROCESSING LETTERS, 2006, 97 (02) : 52 - 57
  • [50] Constructions and Properties of k out of n Visual Secret Sharing Schemes
    Verheul E.R.
    Van Tilborg H.C.A.
    Designs, Codes and Cryptography, 1997, 11 (2) : 179 - 196