|Objectives||Presentation Session: To raise the security awareness and knowledge within APAN community - To exchange experience and knowledge in network security technologies and issues, and - To cooperate with other international security efforts to raise security awareness, capabilities and interoperation globally. WG Meeting: Discuss about activities and plan of Security WG, co-chair election, etc.|
|Target Audience||Researchers, Scientists, Network Engineers, Students|
|Activity Co-ordinator(s)||Yoshiaki Kasahara, Kyushu University, Japan|
|Expected No. of Participants:||40|
|Time:||13:30 - 15:00|
|Session Chair(s):||Rakesh Kumar Jha, Shri Mata Vaishno Devi University, India|
|No. of Participants:||15, out of which 2 have provided feeedback|
|1. ||A study on High Scalable Blockchain Slides (PDF)|
Yuefei Gao, Department of Intelligent Interaction Technologies, China
The blockchain technology, a distributed and public database of
transactions, has become a platform for decentralized applications. Despite
its increasing popularity, blockchain technology still faces scalability
problem. The throughput does not scale with increasing network size. Thus,
in this research, we propose a scalable blockchain protocol to solve the
scalability problem. The proposed protocol was designed based on proof of
stake (PoS) consensus protocol and sharding protocol. Instead of processing
transactions in the whole network, we applied sharding protocol to divide
unconfirmed transactions into transaction shards and to divide the network
into network shards. The network shards process the transaction shards in
parallel to produce middle blocks. Middle blocks are then combined into a
final BLOCK in a timestamp recorded on the blockchain. Experiments were
performed in a simulation network consisting of 100 Amazon EC2 instances.
The latency of the proposed method was around 27 seconds and the largest
throughput reached was 36 transactions per second for the network
containing 100 nodes. The results of the experiments show that the
throughput of the proposed protocol increases as the network size increase.
This confirms the scalability of the proposed protocol.
|2. ||An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems Slides (PDF)|
Abdul Rahim Ahmad, College of Computing and Informatics, Universiti Tenaga Nasional, Malaysia
The increasing interaction of modern industrial control systems (ICS) to the
outside Internet world influences making these systems vulnerable to a wide
range of cyber-attacks. Moreover, the utilisation of Commercial-off-the-Shelf
(COTS) products, as well as open communication protocols, made them attractive
targets to various threat agents including cyber-criminals, national-state, and
cyber-terrorists. Given that, today’s ICSs are deriving the most critical
national infrastructures. Therefore, this raises tremendous needs to secure
these systems against cyber-attacks. Intrusion detection technology has been
considered as one of the most essential security precautions for ICS networks.
It can effectively detect potential cyber-attacks and malicious activities and
prevent catastrophic consequences. This presentation puts forward a method to
detect malicious activities at the ICS networks.
|3. ||UP Cebu Cybersecurity Research and Extension Center: Operations and Challenges Slides (PDF)|
Van Owen Sesaldo, Information Technology Center, University of the Philippines Ceb, Phillipines
Cybersecurity is a concern for everyone, especially for the non-technical
people who comprise a big percentage of the end users of technology. The
University of the Philippines Cebu Cybersecurity Research and Extension Center
is a project that aims to become a hub for Cybersecurity education and
information dissemination within the Central Visayas Region in the Philippines.
The talk is about the Center's infrastructure and current setup along with the
challenges faced by the proponents from the proposal stage up to operations.
|4. ||TPA: Prediction of Spoofing Attack using Thermal Pattern Analysis in Ultra Dense Network for high speed handover scenario Slides (PDF)|
Rakesh Kumar Jha, Shri Mata Vaishno Devi University, India
With the rising demand for high data rate by the subscribers, security
becomes a prominent and critical issue for the emerging Ultra Dense
Networks (UDN). Although, more Access Points (AP's) are involved with
the purpose to strengthen the security aspect and aid in User
Equipment (UE's) throughput enhancement. Thus, UDN serves as a
promising approach to accommodate large number of AP's and UE's and
ensure them with seamless connectivity and ubiquitous
coverage. However, this intensification of Base Station (BS) density
will upsurge the handover (HO) rates for high speed users. In this
paper, we investigate the security issues for the roaming users in
UDN, pertaining to increased handover percentage. Towards this goal,
we propose a novel approach called as Thermal Pattern Analysis (TPA)
to determine the probable region of attack during handover phase, for
high speed users through tracking their footprints of thermal energy
patterns (i.e. Energy and Spectral Efficiency). We also perform the
Secrecy Capacity check on wandering users, considering the fact that
eavesdropper (or Eve) location is erratic. Comprehensive simulations
are performed for real-time deployment; the results validate the
effectiveness of the proposed approach. Consequently, thermal analysis
can be performed for all variety of mobile communication scenarios to
uncover the adversary tremor.
|Time:||15:30 - 17:00|
|Session Chair(s):||Yoshiaki Kasahara, Kyushu University, Japan|
|No. of Participants:||19, out of which 2 have provided feeedback|
|Agenda||We'll discuss about new co-chairs after the presentations. |
|1. ||LAN-Security Monitoring Project Slides (PDF)|
Hideya Ochiai, The University of Tokyo, Japan
In recent years, malware can easily intrude into local-area networks
on phishing e-mails or infected smartphones over Wi-Fi.
About 10% of scan packets on the Internet come from firewall-protected
This talk presents ``LAN-Security Monitoring Project'' that deploys
monitoring devices into LANs of international-collaborators.
It will allow to detect spreading activities or change of
communication patterns caused by malware.
We seek collaborators who are willing to join this project.
|2. ||A measurement study of the Internationalized domain name (IDN) homograph attacks: present and future. |
Tatsuya Mori, Waseda University, Japan
The internationalized domain name (IDN) is a mechanism that allows us to
use the Unicode characters for domain names. In the set of Unicode
characters, several pairs of characters are visually identical with each
other. For instance, the Latin character `a' looks very similar to the
Cyrillic character `а' even though they have different character codes.
Such visually similar characters are generally called Unicode homoglyph.
IDN homograph attack is a widely known attack that attempts to abuse
Unicode homoglyphs to create phishing URLs. Although the IDN homograph
attack is not a new attack, with the recent rise of IDN adoption in both
DNS registries and web browsers, the threat of IDN homograph attack has
increasingly become widespread, leading to the large-scale IDN homograph
attack targeting cryptocurrency exchange company in 2018. In this talk, I
will first present a novel framework that aims at detecting IDN homograph
domains efficiently. Using the framework, I present our findings and
perspectives obtained through the analysis of large-scale domain names. I
also talk about countermeasures against the IDN homograph attacks
|3. ||A Holistic View of DNS Security|
Jamie Gillespie, APNIC, Australia
The Domain Name System (DNS) is a hierarchical decentralised system that
assists humans in not needing to memorise long strings of numerical IP
addresses. It has become so ubiquitous, that it forms part of critical
information infrastructure, and with many businesses relying on its continued
stability and security.
This presentation will examine the complex interactions of this system, from
domain registration to name resolution, the security risks of each component,
and the mitigation options currently available. We will also discuss the
recent DNS hijacking of US .gov domains, and how this undermines several other