6th International Symposium, SSCC 2018, Bangalore, India, September 19-22, 2018, Revised selected papers /
Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat, Jose M. Alcaraz Calero (eds.).
Singapore :
Springer,
2019.
1 online resource (xxv, 708 pages) :
illustrations
Communications in computer and information science,
969
1865-0929 ;
Includes author index.
Intro; Preface; Workshop on Detecting Malicious Domain Names (DMD 2018) Preface; Organization; Contents; A Graph-Based Decision Support Model for Vulnerability Analysis in IoT Networks; 1 Introduction; 1.1 Motivation and Contribution of the Proposed Work; 2 Related Works; 2.1 Graphical Models for Vulnerability Representations; 2.2 Computations on Graphical Models; 3 Proposed Model; 3.1 Formal Definition of the IoT Security Graph; 3.2 Modeling of Attack Paths and Threat Scores; 3.3 TODAG Generation and Security Parameter Estimation; 4 Simulation Results; 4.1 An Example IoT Network
1.1 Evolution of Ransomware1.2 Ransomware Attack Scenario; 2 Preventing Ransomware Attack; 2.1 Awareness and Training; 2.2 Spam Filters and Email Protection; 2.3 Proper Firewall Egress Blocking and Monitoring; 2.4 Patch OS and Software; 2.5 Software Restriction Policies; 2.6 Security Solutions with Anti-ransomware Features; 3 Mitigation Strategies; 3.1 Backup User Data; 3.2 Categorize Data Based on Organizational Value Physical and Logical Separation; 4 Containment Strategies; 4.1 Isolate Infected Systems Including Power Off; 4.2 Unlocker for Certain Families Threat Intelligence
3.3 Query Evaluation Phase4 Analysis of Proposed Work; 5 Conclusion; References; Mitigation of Cross-Site Scripting Attacks in Mobile Cloud Environments; 1 Introduction; 1.1 Motivations and Contributions; 1.2 Organization of the Article; 2 Classifying XSS Vulnerabilities; 2.1 Stored XSS Attacks; 2.2 Reflected XSS Attacks; 2.3 DOM-Based XSS Attacks; 2.4 Binary Encoding Attacks; 3 Related Work; 4 The Proposed Approach to Mitigate XSS Attacks; 5 Performance Evaluation; 5.1 Implementation; 5.2 Performance Analysis Using F-Measure; 6 Conclusion; References
4.3 Change Network Login Credentials4.4 Forensics to Identify Source of Infection Update Rules; 5 Future Directions; 6 Previous Work; 7 Conclusion; References; Inter-path Diversity Metrics for Increasing Networks Robustness Against Zero-Day Attacks; 1 Introduction; 2 Related Work; 3 Attack Graph and Running Example; 4 Proposed Metrics; 5 Use of Inter-path Diversity Metrics for Resource Diversification; 6 Conclusion; References; Cost Based Model for Secure Health Care Data Retrieval; 1 Introduction; 2 Related Work; 3 Proposed Model; 3.1 Storage Phase; 3.2 User Validation Phase
5 ConclusionsReferences; Privacy-Preserving Searchable Encryption Scheme over Encrypted Data Supporting Dynamic Update; 1 Introduction; 1.1 Motivation; 2 Related Work; 3 Problem Formulation; 3.1 Notations; 3.2 System Model; 3.3 Preliminaries; 4 Proposed Scheme; 4.1 Design Goals; 4.2 Proposed Methodolgy; 4.3 Handling Document Updates; 5 Experimental Results and Analysis; 5.1 Precision; 5.2 Rank Privacy; 5.3 Efficiency; 5.4 Security Analysis; 6 Conclusion and Future Work; References; Survey on Prevention, Mitigation and Containment of Ransomware Attacks; Abstract; 1 Introduction
0
8
8
8
8
This book constitutes the refereed proceedings of the 6th International Symposium on Security in Computing and Communications, SSCC 2018, held in Bangalore, India, in September 2018. The 34 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 94 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.