Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717405
Deborah Evans, Michael Coole
The development and use of Artificial Intelligence (AI) within security technologies presents a number of opportunities and risks for security professionals. The study was undertaken to investigate the use of AI in security technologies within the functional categories of Observing, Detecting, Controlling and Responding technologies, exploring the risks associated with enhanced AI across these technologies. In exploring these risks, the study developed a novel scale to define the level of intelligent autonomy a technology may possess during operation, in addition the degree of human involvement retained at each level across the various stages of the AI operational cycle. The Security Technology Intelligent Autonomy Scale may be used to consider the risks which may emerge at each level, with a weighting towards consequences of outcome.
{"title":"Artificial Intelligence in Security Technologies: Levels of Intelligent Autonomy and Risk","authors":"Deborah Evans, Michael Coole","doi":"10.1109/ICCST49569.2021.9717405","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717405","url":null,"abstract":"The development and use of Artificial Intelligence (AI) within security technologies presents a number of opportunities and risks for security professionals. The study was undertaken to investigate the use of AI in security technologies within the functional categories of Observing, Detecting, Controlling and Responding technologies, exploring the risks associated with enhanced AI across these technologies. In exploring these risks, the study developed a novel scale to define the level of intelligent autonomy a technology may possess during operation, in addition the degree of human involvement retained at each level across the various stages of the AI operational cycle. The Security Technology Intelligent Autonomy Scale may be used to consider the risks which may emerge at each level, with a weighting towards consequences of outcome.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122166837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717386
F. Garzia, F. Borghini, Mattia Zita, M. Lombardi, S. Ramalingam
The evaluation of perceived safeness and risk by individuals is really useful for security and safety managing. Every individual is founded on the opinion of other individuals to get a selection and the Internet personifies the location where these judgments are mainly sought, obtained, and evaluated. From this point of view, social networks are characterized by a significant effect. Due to this reason, Opinion Mining and Sentiment Analysis have found remarkable uses in various environments and one of the most interesting is embodied by public security and safety. The aim of this work is to study the perception of risk of aircraft passengers and users of airports of London (UK) and Rome (Italy) during COVID-19 pandemic. In particular, the airports of London Heathrow and Gatwick and the airports of Rome Fiumicino and Ciampino were studied, from March 23 to July 9, 2020, highlighting the emotional components in three distinct pandemic phases of the considered period in the two countries, by means of the semantic analysis of the textual contents existing in Twitter.
{"title":"Emotional analysis of safeness and risk perception of London and Rome airports during the COVID-19 pandemic","authors":"F. Garzia, F. Borghini, Mattia Zita, M. Lombardi, S. Ramalingam","doi":"10.1109/ICCST49569.2021.9717386","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717386","url":null,"abstract":"The evaluation of perceived safeness and risk by individuals is really useful for security and safety managing. Every individual is founded on the opinion of other individuals to get a selection and the Internet personifies the location where these judgments are mainly sought, obtained, and evaluated. From this point of view, social networks are characterized by a significant effect. Due to this reason, Opinion Mining and Sentiment Analysis have found remarkable uses in various environments and one of the most interesting is embodied by public security and safety. The aim of this work is to study the perception of risk of aircraft passengers and users of airports of London (UK) and Rome (Italy) during COVID-19 pandemic. In particular, the airports of London Heathrow and Gatwick and the airports of Rome Fiumicino and Ciampino were studied, from March 23 to July 9, 2020, highlighting the emotional components in three distinct pandemic phases of the considered period in the two countries, by means of the semantic analysis of the textual contents existing in Twitter.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133317484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717390
C. Menon, S. Vidalis
Safety engineering and cyber security have complementary aims, but typically realise these using different techniques, risk assessment methods and cultural approaches. As a result, the integration of safety and cyber security concerns is a complex process, with potential for conflict. We present a generalized taxonomy of common conflict areas between safety and cyber security, oriented around the development and deployment lifecycle, and supplement this with a discussion of concepts and methodologies for resolution based on the shared principle of defence-in-depth.
{"title":"Towards the Resolution of Safety and Security Conflicts","authors":"C. Menon, S. Vidalis","doi":"10.1109/ICCST49569.2021.9717390","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717390","url":null,"abstract":"Safety engineering and cyber security have complementary aims, but typically realise these using different techniques, risk assessment methods and cultural approaches. As a result, the integration of safety and cyber security concerns is a complex process, with potential for conflict. We present a generalized taxonomy of common conflict areas between safety and cyber security, oriented around the development and deployment lifecycle, and supplement this with a discussion of concepts and methodologies for resolution based on the shared principle of defence-in-depth.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129300840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717397
Aklil Zenebe Kiflay, A. Tsokanos, Raimund Kirner
The type and number of cyber-attacks on data networks have been increasing. As networks grow, the importance of Network Intrusion Detection Systems (NIDS) in monitoring cyber threats has also increased. One of the challenges in NIDS is the high number of alerts the systems generate, and the overwhelming effect that alerts have on security operations. To process alerts efficiently, NIDS can be designed to include Machine Learning (ML) capabilities. In the literature, various NIDS architectures that use ML approaches have been proposed. However, high false alarm rates continue to be challenges to most NID systems. In this paper, we present a NIDS that uses ensemble ML in order to improve the performance of attack detection and to decrease the rate of false alarms. To this end, we combine four ensemble ML classifiers - (Random Forest, AdaBoost, XGBoost and Gradient boosting decision tree) using a soft voting scheme.
{"title":"A Network Intrusion Detection System Using Ensemble Machine Learning","authors":"Aklil Zenebe Kiflay, A. Tsokanos, Raimund Kirner","doi":"10.1109/ICCST49569.2021.9717397","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717397","url":null,"abstract":"The type and number of cyber-attacks on data networks have been increasing. As networks grow, the importance of Network Intrusion Detection Systems (NIDS) in monitoring cyber threats has also increased. One of the challenges in NIDS is the high number of alerts the systems generate, and the overwhelming effect that alerts have on security operations. To process alerts efficiently, NIDS can be designed to include Machine Learning (ML) capabilities. In the literature, various NIDS architectures that use ML approaches have been proposed. However, high false alarm rates continue to be challenges to most NID systems. In this paper, we present a NIDS that uses ensemble ML in order to improve the performance of attack detection and to decrease the rate of false alarms. To this end, we combine four ensemble ML classifiers - (Random Forest, AdaBoost, XGBoost and Gradient boosting decision tree) using a soft voting scheme.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130875314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717370
J. S. Prasath, D. Jose, B. Rammyaa, R. Pandian
Information Technology (IT) networks are susceptible to varieties of intrusions. Data communication through industrial networks needs to be protected from unauthorized access. The number of attacks increases rapidly due to the wide range of network operations. Industrial networks provide a connection between servers and control devices, which are located at the plant. The security attacks rises due to the wide usage of internet for accessing and monitoring the plant information. It is essential to preserve data communication in process monitoring and control operations. This proposed work is the novel dynamic key generation algorithm that generates different keys each time during the process of encoding. The security mechanism is developed that enhances the security and protects the information from unauthorized access. This security algorithm is developed and simulated using MATLAB software. This proposed cryptographic algorithm can perform encryption of the infinite number of bytes which provides additional network security. It can be applicable for securing the sensitive process parameters in industrial operations.
{"title":"Dynamic Key Generation Mechanism to Strengthen the Data Security","authors":"J. S. Prasath, D. Jose, B. Rammyaa, R. Pandian","doi":"10.1109/ICCST49569.2021.9717370","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717370","url":null,"abstract":"Information Technology (IT) networks are susceptible to varieties of intrusions. Data communication through industrial networks needs to be protected from unauthorized access. The number of attacks increases rapidly due to the wide range of network operations. Industrial networks provide a connection between servers and control devices, which are located at the plant. The security attacks rises due to the wide usage of internet for accessing and monitoring the plant information. It is essential to preserve data communication in process monitoring and control operations. This proposed work is the novel dynamic key generation algorithm that generates different keys each time during the process of encoding. The security mechanism is developed that enhances the security and protects the information from unauthorized access. This security algorithm is developed and simulated using MATLAB software. This proposed cryptographic algorithm can perform encryption of the infinite number of bytes which provides additional network security. It can be applicable for securing the sensitive process parameters in industrial operations.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127594543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717394
Mike Rhead, Robert Gurney, W. E. Martin
This paper considers the implications of displaying two rear registration plates on trailers following the UK's ratification of the Vienna Convention of Road Traffic. The UK's application of the Vienna Convention is at variance with that of EU members that have ratified the Vienna Convention. Furthermore, it considers how the variability of UK registration plates can have an adverse impact on Automatic Number Plate Recognition (ANPR) and capture rate.
{"title":"Assessment of the Impact of Displaying Two Rear Registration Plates on ANPR","authors":"Mike Rhead, Robert Gurney, W. E. Martin","doi":"10.1109/ICCST49569.2021.9717394","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717394","url":null,"abstract":"This paper considers the implications of displaying two rear registration plates on trailers following the UK's ratification of the Vienna Convention of Road Traffic. The UK's application of the Vienna Convention is at variance with that of EU members that have ratified the Vienna Convention. Furthermore, it considers how the variability of UK registration plates can have an adverse impact on Automatic Number Plate Recognition (ANPR) and capture rate.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"360 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131967445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717406
F. Garzia, F. Borghini, L. Minò, Alberto Bruni, S. Ramalingam, M. Lombardi
In safety and security management, it is important to evaluate the extent of perceived risk by tourists of heritage and cultural sites. Social media is very powerful in this regard as it facilitates reviews that influences the opinions of one by others. It is a key media of advertisement and 90% of tourists rely heavily on the reviews added to these sites. Research in opinion mining and sentiment analysis has gained importance in recent times with a need to enhance public safety and security. Such analysis aids security personnel to look out for unforeseen events that might lead to risks. In some cases, the perceived risks could be exaggerated. Therefore, there is a need to understand the reasons behind such anxiety and include mitigation in place. In this work, we consider the risk perception estimation for the Herculaneum Archaeological Park in Italy. We show how this can influence visitors emotionally by applying sentiment analysis on Twitter data.
{"title":"Emotional reactions to risk perception in the Herculaneum Archaeological Park","authors":"F. Garzia, F. Borghini, L. Minò, Alberto Bruni, S. Ramalingam, M. Lombardi","doi":"10.1109/ICCST49569.2021.9717406","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717406","url":null,"abstract":"In safety and security management, it is important to evaluate the extent of perceived risk by tourists of heritage and cultural sites. Social media is very powerful in this regard as it facilitates reviews that influences the opinions of one by others. It is a key media of advertisement and 90% of tourists rely heavily on the reviews added to these sites. Research in opinion mining and sentiment analysis has gained importance in recent times with a need to enhance public safety and security. Such analysis aids security personnel to look out for unforeseen events that might lead to risks. In some cases, the perceived risks could be exaggerated. Therefore, there is a need to understand the reasons behind such anxiety and include mitigation in place. In this work, we consider the risk perception estimation for the Herculaneum Archaeological Park in Italy. We show how this can influence visitors emotionally by applying sentiment analysis on Twitter data.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"36 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116410084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717384
M. Robinson, P. Schirmer, I. Mporas
Energy smart meters have become very popular, advantaging the general public and utility companies via instant energy monitoring, and modelling, respectively. The information available from smart metering could however be used maliciously with the use of non-intrusive load monitoring technology. In this paper, we explore the vectors for attack on the smart metering network, showing physical and logical locations from which data could be stolen; and show how socio-economic, health related, occupancy, and multi-media viewing habits can be estimated to a high accuracy, thus posing a threat to users' privacy and security.
{"title":"Privacy and Security Threats from Smart Meters Technology","authors":"M. Robinson, P. Schirmer, I. Mporas","doi":"10.1109/ICCST49569.2021.9717384","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717384","url":null,"abstract":"Energy smart meters have become very popular, advantaging the general public and utility companies via instant energy monitoring, and modelling, respectively. The information available from smart metering could however be used maliciously with the use of non-intrusive load monitoring technology. In this paper, we explore the vectors for attack on the smart metering network, showing physical and logical locations from which data could be stolen; and show how socio-economic, health related, occupancy, and multi-media viewing habits can be estimated to a high accuracy, thus posing a threat to users' privacy and security.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122019283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717379
Don Jenkins, L. Liebrock, V. Urias
There are many use cases for cybersecurity related information available on the Internet. Tasks relating to natural language processing and machine learning require large amounts of structured and labeled data. However, the availability of recent data is limited due to the difficulty in its sanitization, retrieval, and labeling. Data on the Internet is generally diverse and unstructured, and storing this information in a manner that is easily usable for research and development purposes is not an intuitive task. We propose architectural considerations when developing a distributed system consisting of web crawlers, web scrapers, and various post-processing components, as well as possible implementations of these considerations. Our team developed such a system that is capable of applying structure and storing open source intelligence data from the Internet in an easily-searchable software platform called Splunk.
{"title":"Designing a Modular and Distributed Web Crawler Focused on Unstructured Cybersecurity Intelligence","authors":"Don Jenkins, L. Liebrock, V. Urias","doi":"10.1109/ICCST49569.2021.9717379","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717379","url":null,"abstract":"There are many use cases for cybersecurity related information available on the Internet. Tasks relating to natural language processing and machine learning require large amounts of structured and labeled data. However, the availability of recent data is limited due to the difficulty in its sanitization, retrieval, and labeling. Data on the Internet is generally diverse and unstructured, and storing this information in a manner that is easily usable for research and development purposes is not an intuitive task. We propose architectural considerations when developing a distributed system consisting of web crawlers, web scrapers, and various post-processing components, as well as possible implementations of these considerations. Our team developed such a system that is capable of applying structure and storing open source intelligence data from the Internet in an easily-searchable software platform called Splunk.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125084033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717380
Dora Kotkova, Tereza Sternova, Zdenek Kalvach, Lukas Kotek
This article is focused on the planning of security measures. In our research, we are focused on soft targets and their protection. In this article, we present one part of our work - the process of planning and security strategy. In the beginning, the definitions of the soft targets and the cultural events are. Then we describe our proposal for schedule steps and security documents for effective security measures, generally for effective security and protection of people. The last part is about security strategy. We need to understand the possibilities of different strategies, their advantages and disadvantages.
{"title":"The Process to Plan Security Measures for Cultural Events","authors":"Dora Kotkova, Tereza Sternova, Zdenek Kalvach, Lukas Kotek","doi":"10.1109/ICCST49569.2021.9717380","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717380","url":null,"abstract":"This article is focused on the planning of security measures. In our research, we are focused on soft targets and their protection. In this article, we present one part of our work - the process of planning and security strategy. In the beginning, the definitions of the soft targets and the cultural events are. Then we describe our proposal for schedule steps and security documents for effective security measures, generally for effective security and protection of people. The last part is about security strategy. We need to understand the possibilities of different strategies, their advantages and disadvantages.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123794638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}