6th International Symposium, SSCC 2018, Bangalore, India, September 19-22, 2018, Revised selected papers /
First Statement of Responsibility
Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat, Jose M. Alcaraz Calero (eds.).
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
Singapore :
Name of Publisher, Distributor, etc.
Springer,
Date of Publication, Distribution, etc.
2019.
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
1 online resource (xxv, 708 pages) :
Other Physical Details
illustrations
SERIES
Series Title
Communications in computer and information science,
Volume Designation
969
ISSN of Series
1865-0929 ;
GENERAL NOTES
Text of Note
Includes author index.
CONTENTS NOTE
Text of Note
Intro; Preface; Workshop on Detecting Malicious Domain Names (DMD 2018) Preface; Organization; Contents; A Graph-Based Decision Support Model for Vulnerability Analysis in IoT Networks; 1 Introduction; 1.1 Motivation and Contribution of the Proposed Work; 2 Related Works; 2.1 Graphical Models for Vulnerability Representations; 2.2 Computations on Graphical Models; 3 Proposed Model; 3.1 Formal Definition of the IoT Security Graph; 3.2 Modeling of Attack Paths and Threat Scores; 3.3 TODAG Generation and Security Parameter Estimation; 4 Simulation Results; 4.1 An Example IoT Network
Text of Note
1.1 Evolution of Ransomware1.2 Ransomware Attack Scenario; 2 Preventing Ransomware Attack; 2.1 Awareness and Training; 2.2 Spam Filters and Email Protection; 2.3 Proper Firewall Egress Blocking and Monitoring; 2.4 Patch OS and Software; 2.5 Software Restriction Policies; 2.6 Security Solutions with Anti-ransomware Features; 3 Mitigation Strategies; 3.1 Backup User Data; 3.2 Categorize Data Based on Organizational Value Physical and Logical Separation; 4 Containment Strategies; 4.1 Isolate Infected Systems Including Power Off; 4.2 Unlocker for Certain Families Threat Intelligence
Text of Note
3.3 Query Evaluation Phase4 Analysis of Proposed Work; 5 Conclusion; References; Mitigation of Cross-Site Scripting Attacks in Mobile Cloud Environments; 1 Introduction; 1.1 Motivations and Contributions; 1.2 Organization of the Article; 2 Classifying XSS Vulnerabilities; 2.1 Stored XSS Attacks; 2.2 Reflected XSS Attacks; 2.3 DOM-Based XSS Attacks; 2.4 Binary Encoding Attacks; 3 Related Work; 4 The Proposed Approach to Mitigate XSS Attacks; 5 Performance Evaluation; 5.1 Implementation; 5.2 Performance Analysis Using F-Measure; 6 Conclusion; References
Text of Note
4.3 Change Network Login Credentials4.4 Forensics to Identify Source of Infection Update Rules; 5 Future Directions; 6 Previous Work; 7 Conclusion; References; Inter-path Diversity Metrics for Increasing Networks Robustness Against Zero-Day Attacks; 1 Introduction; 2 Related Work; 3 Attack Graph and Running Example; 4 Proposed Metrics; 5 Use of Inter-path Diversity Metrics for Resource Diversification; 6 Conclusion; References; Cost Based Model for Secure Health Care Data Retrieval; 1 Introduction; 2 Related Work; 3 Proposed Model; 3.1 Storage Phase; 3.2 User Validation Phase
Text of Note
5 ConclusionsReferences; Privacy-Preserving Searchable Encryption Scheme over Encrypted Data Supporting Dynamic Update; 1 Introduction; 1.1 Motivation; 2 Related Work; 3 Problem Formulation; 3.1 Notations; 3.2 System Model; 3.3 Preliminaries; 4 Proposed Scheme; 4.1 Design Goals; 4.2 Proposed Methodolgy; 4.3 Handling Document Updates; 5 Experimental Results and Analysis; 5.1 Precision; 5.2 Rank Privacy; 5.3 Efficiency; 5.4 Security Analysis; 6 Conclusion and Future Work; References; Survey on Prevention, Mitigation and Containment of Ransomware Attacks; Abstract; 1 Introduction
0
8
8
8
8
SUMMARY OR ABSTRACT
Text of Note
This book constitutes the refereed proceedings of the 6th International Symposium on Security in Computing and Communications, SSCC 2018, held in Bangalore, India, in September 2018. The 34 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 94 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.