Activity Details

Security WG Sessions


ObjectivesPresentation Session: To raise the security awareness and knowledge within APAN community - To exchange experience and knowledge in network security technologies and issues, and - To cooperate with other international security efforts to raise security awareness, capabilities and interoperation globally. WG Meeting: Discuss about activities and plan of Security WG, co-chair election, etc.
Target AudienceResearchers, Scientists, Network Engineers, Students
Activity Co-ordinator(s)Yoshiaki Kasahara, Kyushu University, Japan
Expected No. of Participants:40
Seating ArrangementClassroom

Session 1 : Presentation 1

Date:Thursday 2019-02-21
Time:13:30 - 15:00
Location:Room 203
Session Chair(s):Rakesh Kumar Jha, Shri Mata Vaishno Devi University, India
No. of Participants:15, out of which 2 have provided feeedback
Agenda
1.  A study on High Scalable Blockchain   Slides (PDF)
Yuefei Gao, Department of Intelligent Interaction Technologies, China
Shin Kawai
Hajime Nobuhara
The blockchain technology, a distributed and public database of transactions, has become a platform for decentralized applications. Despite its increasing popularity, blockchain technology still faces scalability problem. The throughput does not scale with increasing network size. Thus, in this research, we propose a scalable blockchain protocol to solve the scalability problem. The proposed protocol was designed based on proof of stake (PoS) consensus protocol and sharding protocol. Instead of processing transactions in the whole network, we applied sharding protocol to divide unconfirmed transactions into transaction shards and to divide the network into network shards. The network shards process the transaction shards in parallel to produce middle blocks. Middle blocks are then combined into a final BLOCK in a timestamp recorded on the blockchain. Experiments were performed in a simulation network consisting of 100 Amazon EC2 instances. The latency of the proposed method was around 27 seconds and the largest throughput reached was 36 transactions per second for the network containing 100 nodes. The results of the experiments show that the throughput of the proposed protocol increases as the network size increase. This confirms the scalability of the proposed protocol.
2.  An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems   Slides (PDF)
Abdul Rahim Ahmad, College of Computing and Informatics, Universiti Tenaga Nasional, Malaysia
The increasing interaction of modern industrial control systems (ICS) to the outside Internet world influences making these systems vulnerable to a wide range of cyber-attacks. Moreover, the utilisation of Commercial-off-the-Shelf (COTS) products, as well as open communication protocols, made them attractive targets to various threat agents including cyber-criminals, national-state, and cyber-terrorists. Given that, today’s ICSs are deriving the most critical national infrastructures. Therefore, this raises tremendous needs to secure these systems against cyber-attacks. Intrusion detection technology has been considered as one of the most essential security precautions for ICS networks. It can effectively detect potential cyber-attacks and malicious activities and prevent catastrophic consequences. This presentation puts forward a method to detect malicious activities at the ICS networks.
3.  UP Cebu Cybersecurity Research and Extension Center: Operations and Challenges   Slides (PDF)
Van Owen Sesaldo, Information Technology Center, University of the Philippines Ceb, Phillipines
Cybersecurity is a concern for everyone, especially for the non-technical people who comprise a big percentage of the end users of technology. The University of the Philippines Cebu Cybersecurity Research and Extension Center is a project that aims to become a hub for Cybersecurity education and information dissemination within the Central Visayas Region in the Philippines. The talk is about the Center's infrastructure and current setup along with the challenges faced by the proponents from the proposal stage up to operations.
4.  TPA: Prediction of Spoofing Attack using Thermal Pattern Analysis in Ultra Dense Network for high speed handover scenario    Slides (PDF)
Rakesh Kumar Jha, Shri Mata Vaishno Devi University, India
With the rising demand for high data rate by the subscribers, security becomes a prominent and critical issue for the emerging Ultra Dense Networks (UDN). Although, more Access Points (AP's) are involved with the purpose to strengthen the security aspect and aid in User Equipment (UE's) throughput enhancement. Thus, UDN serves as a promising approach to accommodate large number of AP's and UE's and ensure them with seamless connectivity and ubiquitous coverage. However, this intensification of Base Station (BS) density will upsurge the handover (HO) rates for high speed users. In this paper, we investigate the security issues for the roaming users in UDN, pertaining to increased handover percentage. Towards this goal, we propose a novel approach called as Thermal Pattern Analysis (TPA) to determine the probable region of attack during handover phase, for high speed users through tracking their footprints of thermal energy patterns (i.e. Energy and Spectral Efficiency). We also perform the Secrecy Capacity check on wandering users, considering the fact that eavesdropper (or Eve) location is erratic. Comprehensive simulations are performed for real-time deployment; the results validate the effectiveness of the proposed approach. Consequently, thermal analysis can be performed for all variety of mobile communication scenarios to uncover the adversary tremor.

Session 2 : Presentation 2 / WG discussion

Date:Thursday 2019-02-21
Time:15:30 - 17:00
Location:Room 203
Session Chair(s):Yoshiaki Kasahara, Kyushu University, Japan
No. of Participants:19, out of which 2 have provided feeedback
AgendaWe'll discuss about new co-chairs after the presentations.
1.  LAN-Security Monitoring Project   Slides (PDF)
Hideya Ochiai, The University of Tokyo, Japan
In recent years, malware can easily intrude into local-area networks (LANs) on phishing e-mails or infected smartphones over Wi-Fi. About 10% of scan packets on the Internet come from firewall-protected networks. This talk presents ``LAN-Security Monitoring Project'' that deploys monitoring devices into LANs of international-collaborators. It will allow to detect spreading activities or change of communication patterns caused by malware. We seek collaborators who are willing to join this project.
2.  A measurement study of the Internationalized domain name (IDN) homograph attacks: present and future.
Tatsuya Mori, Waseda University, Japan
The internationalized domain name (IDN) is a mechanism that allows us to use the Unicode characters for domain names. In the set of Unicode characters, several pairs of characters are visually identical with each other. For instance, the Latin character `a' looks very similar to the Cyrillic character `а' even though they have different character codes. Such visually similar characters are generally called Unicode homoglyph. IDN homograph attack is a widely known attack that attempts to abuse Unicode homoglyphs to create phishing URLs. Although the IDN homograph attack is not a new attack, with the recent rise of IDN adoption in both DNS registries and web browsers, the threat of IDN homograph attack has increasingly become widespread, leading to the large-scale IDN homograph attack targeting cryptocurrency exchange company in 2018. In this talk, I will first present a novel framework that aims at detecting IDN homograph domains efficiently. Using the framework, I present our findings and perspectives obtained through the analysis of large-scale domain names. I also talk about countermeasures against the IDN homograph attacks
3.  A Holistic View of DNS Security
Jamie Gillespie, APNIC, Australia
The Domain Name System (DNS) is a hierarchical decentralised system that assists humans in not needing to memorise long strings of numerical IP addresses. It has become so ubiquitous, that it forms part of critical information infrastructure, and with many businesses relying on its continued stability and security. This presentation will examine the complex interactions of this system, from domain registration to name resolution, the security risks of each component, and the mitigation options currently available. We will also discuss the recent DNS hijacking of US .gov domains, and how this undermines several other security measures.
TOP