首页 > 最新文献

2016 Cybersecurity and Cyberforensics Conference (CCC)最新文献

英文 中文
Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors 通过在物理上不可克隆的唯一处理器上部署排列代码来提高弹性
Pub Date : 2016-10-20 DOI: 10.1109/CCC.2016.30
A. Assmuth, W. Cockshott, Jana Kipke, K. Renaud, Lewis Mackenzie, W. Vanderbauwhede, Matthias Söllner, Tilo Fischer, G. Weir
Industrial control systems (ICSs) are, at present, extremely vulnerable to cyber attack because they are homogenous and interconnected. Mitigating solutions are urgently required because systems breaches can feasibly lead to fatalities. In this paper we propose the deployment of permuted code onto Physically Unclonable Unique Processors in order to resist common cyber attacks. We present our proposal and explain how it would resist attacks from hostile agents.
目前,工业控制系统(ics)极易受到网络攻击,因为它们是同质且相互关联的。迫切需要缓解方案,因为系统破坏可能导致死亡。在本文中,我们提出将排列代码部署到物理上不可克隆的唯一处理器上,以抵御常见的网络攻击。我们提出了我们的建议,并解释了它将如何抵御敌对机构的攻击。
{"title":"Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors","authors":"A. Assmuth, W. Cockshott, Jana Kipke, K. Renaud, Lewis Mackenzie, W. Vanderbauwhede, Matthias Söllner, Tilo Fischer, G. Weir","doi":"10.1109/CCC.2016.30","DOIUrl":"https://doi.org/10.1109/CCC.2016.30","url":null,"abstract":"Industrial control systems (ICSs) are, at present, extremely vulnerable to cyber attack because they are homogenous and interconnected. Mitigating solutions are urgently required because systems breaches can feasibly lead to fatalities. In this paper we propose the deployment of permuted code onto Physically Unclonable Unique Processors in order to resist common cyber attacks. We present our proposal and explain how it would resist attacks from hostile agents.","PeriodicalId":120509,"journal":{"name":"2016 Cybersecurity and Cyberforensics Conference (CCC)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134050164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cybersecurity and the Unbearability of Uncertainty 网络安全和不确定性的不可承受性
Pub Date : 2016-10-20 DOI: 10.1109/CCC.2016.29
K. Renaud, G. Weir
Cyber criminals increasingly target Small and Medium Sized Businesses (SMEs) since they are perceived to have the weakest defences. Some will not survive a cyber attack, and others will have their ability to continue trading seriously impaired. There is compelling evidence that, at present, SMEs do not seem to be implementing all the advisable security measures which could help them to resist such attacks. Many in the security industry believe that this is because SMEs do not take the threat seriously. This paper reports on a study to find out whether this is the case, or not. The primary finding is that most SMEs do care about the threat but that very few implement even a small subset of the available security precautions. One contributory factor seemed to be the uncertainty caused by the wealth of conflicting and confusing online advice offered by industry and official bodies. This seemed to be hindering rather than helping SMEs so that they did not know what actions to take to improve their resilience. The conclusion is a recommendation for actions to be taken to better inform SMEs and help them to secure their systems more effectively.
网络罪犯越来越多地瞄准中小型企业,因为它们被认为是防御最薄弱的。一些公司将无法在网络攻击中幸存下来,而另一些公司继续交易的能力将受到严重损害。有令人信服的证据表明,目前,中小企业似乎没有实施所有可以帮助他们抵御此类攻击的可取安全措施。许多安防行业人士认为,这是因为中小企业没有认真对待威胁。本文报告了一项研究,以了解情况是否如此。主要发现是,大多数中小企业确实关心威胁,但很少有人实施可用安全预防措施的一小部分。一个促成因素似乎是行业和官方机构提供的大量相互矛盾和令人困惑的在线建议所带来的不确定性。这似乎是阻碍而不是帮助中小企业,使他们不知道采取什么行动来提高他们的应变能力。结论是建议采取行动,以便更好地向中小企业提供信息,并帮助它们更有效地保护其系统。
{"title":"Cybersecurity and the Unbearability of Uncertainty","authors":"K. Renaud, G. Weir","doi":"10.1109/CCC.2016.29","DOIUrl":"https://doi.org/10.1109/CCC.2016.29","url":null,"abstract":"Cyber criminals increasingly target Small and Medium Sized Businesses (SMEs) since they are perceived to have the weakest defences. Some will not survive a cyber attack, and others will have their ability to continue trading seriously impaired. There is compelling evidence that, at present, SMEs do not seem to be implementing all the advisable security measures which could help them to resist such attacks. Many in the security industry believe that this is because SMEs do not take the threat seriously. This paper reports on a study to find out whether this is the case, or not. The primary finding is that most SMEs do care about the threat but that very few implement even a small subset of the available security precautions. One contributory factor seemed to be the uncertainty caused by the wealth of conflicting and confusing online advice offered by industry and official bodies. This seemed to be hindering rather than helping SMEs so that they did not know what actions to take to improve their resilience. The conclusion is a recommendation for actions to be taken to better inform SMEs and help them to secure their systems more effectively.","PeriodicalId":120509,"journal":{"name":"2016 Cybersecurity and Cyberforensics Conference (CCC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121704981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Management Attitudes toward Information Security in Omani Public Sector Organisations 阿曼公共部门组织对信息安全的管理态度
Pub Date : 2016-10-20 DOI: 10.1109/CCC.2016.28
Fathiya Al Izki, G. Weir
The incorporation of ICT in public sector organisations is progressing rapidly in Oman where the government sees this as a means to enhance the delivery of online services. In this context, preserving the security of information, and making Information Security a core organisational aspect in public sector organisations, requires attention from management. Our research is the first known attempt to gauge management attitudes toward Information Security in Oman. We also consider how such attitudes influence Information Security governance. In addressing these issues, we review current compliance with Information Security procedures in Omani public sector organisations, review management attitudes toward Information Security governance practices, and explore how management attitudes toward Information Security impact upon these aspects.
在阿曼,信息通信技术在公共部门组织中的应用进展迅速,政府将其视为加强在线服务提供的一种手段。在这种情况下,维护资讯安全,并使资讯安全成为公营机构的核心组织方面,需要管理层的关注。我们的研究是第一个已知的尝试衡量管理态度对信息安全在阿曼。我们还考虑了这些态度如何影响信息安全治理。在解决这些问题时,我们审查了阿曼公共部门组织当前对信息安全程序的遵守情况,审查了对信息安全治理实践的管理态度,并探讨了对信息安全的管理态度如何影响这些方面。
{"title":"Management Attitudes toward Information Security in Omani Public Sector Organisations","authors":"Fathiya Al Izki, G. Weir","doi":"10.1109/CCC.2016.28","DOIUrl":"https://doi.org/10.1109/CCC.2016.28","url":null,"abstract":"The incorporation of ICT in public sector organisations is progressing rapidly in Oman where the government sees this as a means to enhance the delivery of online services. In this context, preserving the security of information, and making Information Security a core organisational aspect in public sector organisations, requires attention from management. Our research is the first known attempt to gauge management attitudes toward Information Security in Oman. We also consider how such attitudes influence Information Security governance. In addressing these issues, we review current compliance with Information Security procedures in Omani public sector organisations, review management attitudes toward Information Security governance practices, and explore how management attitudes toward Information Security impact upon these aspects.","PeriodicalId":120509,"journal":{"name":"2016 Cybersecurity and Cyberforensics Conference (CCC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115795314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Exploiting Vulnerability Disclosures: Statistical Framework and Case Study 利用漏洞披露:统计框架和案例研究
Pub Date : 2016-10-18 DOI: 10.1109/CCC.2016.10
Mingjian Tang, M. Alazab, Yuxiu Luo
With an ever-increasing trend of cybercrimes and incidents due to software vulnerabilities and exposures, effective and proactive vulnerability management becomes imperative in modern organisations regardless large or small. Forecasting models leveraging rich historical vulnerability disclosure data undoubtedly provide important insights to inform the cyber community with the anticipated risks. In this paper, we proposed a novel framework for statistically analysing long-term vulnerability time series between January 1999 and January 2016. By utilising this sound framework, we initiated an important study on not only testing but also modelling persistent volatilities in the data. In sharp contrast to the existing models, we consider capturing both mean and conditional variance latent in the disclosure series. Through extensive empirical studies, a composite model is shown to effectively capture the sporadic nature of vulnerability time series. In addition, this paper paves the way for further study on the stochastic perspective of cyber vulnerability proliferation towards more accurate prediction models and better risk management.
随着软件漏洞和暴露导致的网络犯罪和事件的不断增加,有效和主动的漏洞管理对于现代组织,无论大小,都是必不可少的。利用丰富的历史漏洞披露数据的预测模型无疑为告知网络社区预期的风险提供了重要的见解。在本文中,我们提出了一个新的框架,用于统计分析1999年1月至2016年1月之间的长期脆弱性时间序列。通过利用这一健全的框架,我们开始了一项重要的研究,不仅对数据的持续波动进行测试,而且对数据的持续波动进行建模。与现有模型形成鲜明对比的是,我们考虑捕获披露系列中潜在的均值和条件方差。通过大量的实证研究,表明复合模型可以有效地捕捉脆弱性时间序列的偶发性。此外,本文还为进一步从网络脆弱性扩散的随机视角进行研究,建立更准确的预测模型和更好的风险管理奠定了基础。
{"title":"Exploiting Vulnerability Disclosures: Statistical Framework and Case Study","authors":"Mingjian Tang, M. Alazab, Yuxiu Luo","doi":"10.1109/CCC.2016.10","DOIUrl":"https://doi.org/10.1109/CCC.2016.10","url":null,"abstract":"With an ever-increasing trend of cybercrimes and incidents due to software vulnerabilities and exposures, effective and proactive vulnerability management becomes imperative in modern organisations regardless large or small. Forecasting models leveraging rich historical vulnerability disclosure data undoubtedly provide important insights to inform the cyber community with the anticipated risks. In this paper, we proposed a novel framework for statistically analysing long-term vulnerability time series between January 1999 and January 2016. By utilising this sound framework, we initiated an important study on not only testing but also modelling persistent volatilities in the data. In sharp contrast to the existing models, we consider capturing both mean and conditional variance latent in the disclosure series. Through extensive empirical studies, a composite model is shown to effectively capture the sporadic nature of vulnerability time series. In addition, this paper paves the way for further study on the stochastic perspective of cyber vulnerability proliferation towards more accurate prediction models and better risk management.","PeriodicalId":120509,"journal":{"name":"2016 Cybersecurity and Cyberforensics Conference (CCC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134443567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Android Forensics: Investigating Social Networking Cybercrimes against Man-in-the-Middle Attacks Android取证:针对中间人攻击调查社交网络网络犯罪
Pub Date : 2016-08-01 DOI: 10.1109/CCC.2016.15
K. Zaabi
Cyber-attacks are on the rise due to the increased usage of social networking application's built-in Android devices via Wi-Fi connections, which has resulted in privacy issues. Several studies have been conducted to investigate Android phones, however, none of these have proposed a comprehensive Android investigation method, which begins with a Man-in-the-Middle attack and ending in a criminal investigation. The purpose of this research is to propose an Android forensics framework against such Wi-Fi attacks, using advanced forensic tools, such as the Cellebrite Universal Forensic Extraction Device and the Oxygen. This will assist the researcher to prove the suggested arguments in the following: 1. To implement guidelines for the forensic examiners, especially for those new in the field of forensics, and 2. To guide Android and social networking application developers to enhance the level of security. Furthermore, this study recommends the best data extraction methods designed for Android devices.
由于社交网络应用内置的Android设备通过Wi-Fi连接的使用增加,网络攻击呈上升趋势,这导致了隐私问题。已经有几项研究对Android手机进行了调查,然而,这些研究都没有提出一种全面的Android调查方法,即从中间人攻击开始,以刑事调查结束。本研究的目的是利用先进的取证工具,如Cellebrite通用取证提取设备和Oxygen,提出一个针对此类Wi-Fi攻击的Android取证框架。这将有助于研究者证明以下建议的论点:1。为法医鉴定人,特别是初入法医学领域的鉴定人实施指导方针;指导Android及社交网络应用开发者提升安全级别。此外,本研究还推荐了针对Android设备设计的最佳数据提取方法。
{"title":"Android Forensics: Investigating Social Networking Cybercrimes against Man-in-the-Middle Attacks","authors":"K. Zaabi","doi":"10.1109/CCC.2016.15","DOIUrl":"https://doi.org/10.1109/CCC.2016.15","url":null,"abstract":"Cyber-attacks are on the rise due to the increased usage of social networking application's built-in Android devices via Wi-Fi connections, which has resulted in privacy issues. Several studies have been conducted to investigate Android phones, however, none of these have proposed a comprehensive Android investigation method, which begins with a Man-in-the-Middle attack and ending in a criminal investigation. The purpose of this research is to propose an Android forensics framework against such Wi-Fi attacks, using advanced forensic tools, such as the Cellebrite Universal Forensic Extraction Device and the Oxygen. This will assist the researcher to prove the suggested arguments in the following: 1. To implement guidelines for the forensic examiners, especially for those new in the field of forensics, and 2. To guide Android and social networking application developers to enhance the level of security. Furthermore, this study recommends the best data extraction methods designed for Android devices.","PeriodicalId":120509,"journal":{"name":"2016 Cybersecurity and Cyberforensics Conference (CCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130771289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Proposed Model for Malicious Spam Detection in Email Systems of Educational Institutes 一种针对教育机构电子邮件系统的恶意垃圾邮件检测模型
Pub Date : 2016-08-01 DOI: 10.1109/CCC.2016.24
Aisha Zaid, Ja'far Alqatawna, Ammar Huneiti
The cheapest form of communication in the world today is email, and its simplicity makes it vulnerable to many threats. One of the most important threats to email is spam, unsolicited email, normally with an advertising content sent out as a mass mailing. Malicious spam is spam with malicious content in forms of harmful attachments or links to phishing websites. In the case of educational institutes, malicious spam threatens the privacy and security of large amount of sensitive data relating to staff and students. Hence, a system that can automatically learn how to classify malicious spam in educational institutes is highly desirable. In this paper, we aim to improve detection of malicious spam through feature selection, with focus on the educational field. We propose a model that employs a novel dataset for the process of feature selection, a step for improving classification in later stage. This dataset is unprecedented as no research in the literature was intended to serve malicious spam detection in a specific domain or field such as the educational field. Feature selection is expected to improve training time and accuracy of malicious spam detection.
当今世界上最便宜的通信方式是电子邮件,它的简单性使它容易受到许多威胁。对电子邮件最重要的威胁之一是垃圾邮件,即未经请求的电子邮件,通常带有大量邮件发送的广告内容。恶意垃圾邮件是以有害附件或钓鱼网站链接的形式提供恶意内容的垃圾邮件。以教育机构为例,恶意垃圾邮件威胁着教职员工和学生大量敏感数据的隐私和安全。因此,能够自动学习如何在教育机构中分类恶意垃圾邮件的系统是非常可取的。在本文中,我们的目标是通过特征选择来改进恶意垃圾邮件的检测,重点关注教育领域。我们提出了一种模型,该模型使用新的数据集进行特征选择,这是后期改进分类的一步。这个数据集是前所未有的,因为在文献中没有研究打算在特定的领域或领域(如教育领域)提供恶意垃圾邮件检测。特征选择有望提高恶意垃圾邮件检测的训练时间和准确性。
{"title":"A Proposed Model for Malicious Spam Detection in Email Systems of Educational Institutes","authors":"Aisha Zaid, Ja'far Alqatawna, Ammar Huneiti","doi":"10.1109/CCC.2016.24","DOIUrl":"https://doi.org/10.1109/CCC.2016.24","url":null,"abstract":"The cheapest form of communication in the world today is email, and its simplicity makes it vulnerable to many threats. One of the most important threats to email is spam, unsolicited email, normally with an advertising content sent out as a mass mailing. Malicious spam is spam with malicious content in forms of harmful attachments or links to phishing websites. In the case of educational institutes, malicious spam threatens the privacy and security of large amount of sensitive data relating to staff and students. Hence, a system that can automatically learn how to classify malicious spam in educational institutes is highly desirable. In this paper, we aim to improve detection of malicious spam through feature selection, with focus on the educational field. We propose a model that employs a novel dataset for the process of feature selection, a step for improving classification in later stage. This dataset is unprecedented as no research in the literature was intended to serve malicious spam detection in a specific domain or field such as the educational field. Feature selection is expected to improve training time and accuracy of malicious spam detection.","PeriodicalId":120509,"journal":{"name":"2016 Cybersecurity and Cyberforensics Conference (CCC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114827471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analyzing CyberCrimes Strategies: The Case of Phishing Attack 网络犯罪策略分析:以网络钓鱼攻击为例
Pub Date : 2016-08-01 DOI: 10.1109/CCC.2016.25
Rola Al Halaseh, Ja'far Alqatawna
The growth in technology usage came along with many risks and increase in cybercrimes incidents. Phishing attacks are a form of cybercrimes by which attackers trick victims in order to obtain personal and sensitive information. Phishers motivations include gaining unauthorized information and access, cause financial loss and many more negative impacts. While cybercriminals keep developing their techniques, investigating different attack styles and methodologies are important steps toward developing effective protection mechanisms. This paper contributes to this direction by presenting and analyzing various phishing attack styles including Nigerian, Ghanaian, Chinese and Russian cybercrime styles. Due to richness of learning resources Russians and Chinese were found to be using more advanced techniques than Ghanaians and Nigerians who has limited resources.
技术使用的增长伴随着许多风险和网络犯罪事件的增加。网络钓鱼攻击是网络犯罪的一种形式,攻击者通过欺骗受害者以获取个人和敏感信息。钓鱼者的动机包括获取未经授权的信息和访问,造成经济损失和更多的负面影响。当网络犯罪分子不断发展他们的技术时,研究不同的攻击风格和方法是建立有效保护机制的重要步骤。本文通过介绍和分析各种网络钓鱼攻击风格,包括尼日利亚、加纳、中国和俄罗斯的网络犯罪风格,为这一方向做出了贡献。由于学习资源丰富,俄罗斯人和中国人比资源有限的加纳人和尼日利亚人使用更先进的技术。
{"title":"Analyzing CyberCrimes Strategies: The Case of Phishing Attack","authors":"Rola Al Halaseh, Ja'far Alqatawna","doi":"10.1109/CCC.2016.25","DOIUrl":"https://doi.org/10.1109/CCC.2016.25","url":null,"abstract":"The growth in technology usage came along with many risks and increase in cybercrimes incidents. Phishing attacks are a form of cybercrimes by which attackers trick victims in order to obtain personal and sensitive information. Phishers motivations include gaining unauthorized information and access, cause financial loss and many more negative impacts. While cybercriminals keep developing their techniques, investigating different attack styles and methodologies are important steps toward developing effective protection mechanisms. This paper contributes to this direction by presenting and analyzing various phishing attack styles including Nigerian, Ghanaian, Chinese and Russian cybercrime styles. Due to richness of learning resources Russians and Chinese were found to be using more advanced techniques than Ghanaians and Nigerians who has limited resources.","PeriodicalId":120509,"journal":{"name":"2016 Cybersecurity and Cyberforensics Conference (CCC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132498820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Fraud Prevention Framework for Electronic Business Environments: Automatic Segregation of Online Phishing Attempts 电子商业环境的欺诈预防框架:自动隔离网络钓鱼企图
Pub Date : 2016-08-01 DOI: 10.1109/CCC.2016.17
Nazeeh Ghatasheh
In the era of digital economy and high penetration rate of technology, cybercrime is taking over a great span of the cyberworld. Novice to experienced users are subject to being victims to cyber criminals. Phishing attempts lead to critical issues and risks for online users, and for companies as well. This research proposes a framework for fraud prevention by enabling the automatic detection of malicious websites. The applicability of the framework is validated by various types of experiments. The experiments tries to model phishing websites using various algorithms and approaches, including hybrid approaches. It is apparent that the performance of Random Forest Trees algorithm overperformed several other algorithms. Accordingly, the framework is proved to be useful in the segregation of malicious online content and phishing attempts. In addition the results call for more investigation and improvement in fraud prevention approaches.
在数字经济和高技术普及率的时代,网络犯罪正在网络世界中大行其道。从新手到资深用户都有可能成为网络罪犯的受害者。网络钓鱼企图给网络用户和公司带来了严重的问题和风险。本研究提出了一个通过自动检测恶意网站来预防欺诈的框架。各种类型的实验验证了该框架的适用性。实验尝试使用各种算法和方法(包括混合方法)对钓鱼网站进行建模。显然,随机森林树算法的性能优于其他几种算法。因此,该框架被证明在隔离恶意在线内容和网络钓鱼尝试方面非常有用。此外,研究结果还要求对欺诈预防方法进行更多的调查和改进。
{"title":"Fraud Prevention Framework for Electronic Business Environments: Automatic Segregation of Online Phishing Attempts","authors":"Nazeeh Ghatasheh","doi":"10.1109/CCC.2016.17","DOIUrl":"https://doi.org/10.1109/CCC.2016.17","url":null,"abstract":"In the era of digital economy and high penetration rate of technology, cybercrime is taking over a great span of the cyberworld. Novice to experienced users are subject to being victims to cyber criminals. Phishing attempts lead to critical issues and risks for online users, and for companies as well. This research proposes a framework for fraud prevention by enabling the automatic detection of malicious websites. The applicability of the framework is validated by various types of experiments. The experiments tries to model phishing websites using various algorithms and approaches, including hybrid approaches. It is apparent that the performance of Random Forest Trees algorithm overperformed several other algorithms. Accordingly, the framework is proved to be useful in the segregation of malicious online content and phishing attempts. In addition the results call for more investigation and improvement in fraud prevention approaches.","PeriodicalId":120509,"journal":{"name":"2016 Cybersecurity and Cyberforensics Conference (CCC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126409281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Websites' Input Validation and Input-Misuse-Based Attacks 网站输入验证和基于输入滥用的攻击
Pub Date : 2016-08-01 DOI: 10.1109/CCC.2016.31
I. Alsmadi, Iyad Alazzam
Websites typically include many forms or web elements that allow users to enter and submit data. This data will be eventually executed in the back-end databases. Users can, intentionally or unintentionally enter improper input data that, if reach those back-end databases, may cause some serious security or damaging problems. For proper user interface design as well as for security reasons, it is important for web-designers to consider input-validation techniques at the user interface level or as early as possible. The goal is to stop further actions for any invalid input data. In this paper, we conducted an evaluation study of how much input validation is used by web-designers. We used some of the web attacks that target improper input validations as indicators to show the quality of the input validation process for the evaluated websites. Results showed that those types of attacks continue to be effective and serious methods. Results showed also that there is a need for systematic and frequent evaluation for those websites to ensure that basic input validation guidelines are observed.
网站通常包含许多允许用户输入和提交数据的表单或web元素。这些数据最终将在后端数据库中执行。用户可能有意无意地输入不正确的输入数据,如果这些数据到达后端数据库,可能会导致一些严重的安全或破坏性问题。为了正确的用户界面设计和安全的原因,对于网页设计师来说,在用户界面级别或尽早考虑输入验证技术是很重要的。目标是停止对任何无效输入数据的进一步操作。在本文中,我们对网页设计师使用了多少输入验证进行了评估研究。我们使用了一些针对不正确输入验证的网络攻击作为指标,以显示被评估网站的输入验证过程的质量。结果表明,这类攻击方法持续有效且严重。结果还表明,需要对这些网站进行系统和频繁的评估,以确保基本的输入验证准则得到遵守。
{"title":"Websites' Input Validation and Input-Misuse-Based Attacks","authors":"I. Alsmadi, Iyad Alazzam","doi":"10.1109/CCC.2016.31","DOIUrl":"https://doi.org/10.1109/CCC.2016.31","url":null,"abstract":"Websites typically include many forms or web elements that allow users to enter and submit data. This data will be eventually executed in the back-end databases. Users can, intentionally or unintentionally enter improper input data that, if reach those back-end databases, may cause some serious security or damaging problems. For proper user interface design as well as for security reasons, it is important for web-designers to consider input-validation techniques at the user interface level or as early as possible. The goal is to stop further actions for any invalid input data. In this paper, we conducted an evaluation study of how much input validation is used by web-designers. We used some of the web attacks that target improper input validations as indicators to show the quality of the input validation process for the evaluated websites. Results showed that those types of attacks continue to be effective and serious methods. Results showed also that there is a need for systematic and frequent evaluation for those websites to ensure that basic input validation guidelines are observed.","PeriodicalId":120509,"journal":{"name":"2016 Cybersecurity and Cyberforensics Conference (CCC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131648487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Boosting Usability for Protecting Online Banking Applications Against APTs 提高保护网上银行应用程序免受apt攻击的可用性
Pub Date : 2016-08-01 DOI: 10.1109/CCC.2016.13
Mohannad J. Alhanahnah, D. Chadwick
With the advent of Advanced Persistent Threats (APTs) and exploits such as Eurograbber, we can no longer trust the user's PC or mobile phone to be honest in their transactions with banks. This paper reviews the current state of the art in protecting PCs from malware and APTs that can modify banking transactions, and identifies their strengths and weaknesses. It then proposes an enhanced USB device based on speech and vision. User trials with a software prototype show that such a device is both user friendly and that users are less susceptible to accepting subtly modified transaction with this device than with other vision only USB devices. Since human factors are usually the weakest point in the security chain, and are often the way that APT actors perform their attacks, the focus of the proposed solution is on improving the usability of existing USB devices. However the device is still not failsafe, and therefore may not be as preferable as Sm@rt TAN-plus that is currently used by many German banks.
随着高级持续威胁(apt)和Eurograbber等漏洞的出现,我们再也不能相信用户的PC或手机在与银行的交易中是诚实的。本文回顾了目前保护个人电脑免受恶意软件和apt攻击的最新技术,这些恶意软件和apt可以修改银行交易,并确定了它们的优点和缺点。然后提出了一种基于语音和视觉的增强型USB设备。使用软件原型的用户试用表明,这种设备既方便用户使用,而且与其他仅视觉的USB设备相比,用户更不容易接受使用这种设备进行细微修改的交易。由于人为因素通常是安全链中最薄弱的环节,并且通常是APT攻击者执行攻击的方式,因此提出的解决方案的重点是提高现有USB设备的可用性。然而,该设备仍然不是故障保险,因此可能不如目前许多德国银行使用的Sm@rt TAN-plus更可取。
{"title":"Boosting Usability for Protecting Online Banking Applications Against APTs","authors":"Mohannad J. Alhanahnah, D. Chadwick","doi":"10.1109/CCC.2016.13","DOIUrl":"https://doi.org/10.1109/CCC.2016.13","url":null,"abstract":"With the advent of Advanced Persistent Threats (APTs) and exploits such as Eurograbber, we can no longer trust the user's PC or mobile phone to be honest in their transactions with banks. This paper reviews the current state of the art in protecting PCs from malware and APTs that can modify banking transactions, and identifies their strengths and weaknesses. It then proposes an enhanced USB device based on speech and vision. User trials with a software prototype show that such a device is both user friendly and that users are less susceptible to accepting subtly modified transaction with this device than with other vision only USB devices. Since human factors are usually the weakest point in the security chain, and are often the way that APT actors perform their attacks, the focus of the proposed solution is on improving the usability of existing USB devices. However the device is still not failsafe, and therefore may not be as preferable as Sm@rt TAN-plus that is currently used by many German banks.","PeriodicalId":120509,"journal":{"name":"2016 Cybersecurity and Cyberforensics Conference (CCC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134201339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 Cybersecurity and Cyberforensics Conference (CCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1