首页 > 最新文献

Digital Threats: Research and Practice最新文献

英文 中文
Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions 理解国家csirt如何评估网络事件响应工具和数据:来自焦点小组讨论的发现
Pub Date : 2023-07-17 DOI: 10.1145/3609230
Sharifah Roziah Mohd Kassim, Shujun Li, B. Arief
National Computer Security Incident Response Teams (CSIRTs) have been established worldwide to coordinate responses to computer security incidents at the national level. While it is known that national CSIRTs routinely use different types of tools and data from various sources in their cyber incident investigations, limited studies are available about how national CSIRTs evaluate and choose which tools and data to use for incident response. Such an evaluation is important to ensure that these tools and data are of good quality and, consequently, help to increase the effectiveness of the incident response process and the quality of incident response investigations. Seven online focus group discussions with 20 participants (all staff members) from 15 national CSIRTs across Africa, Asia Pacific, Europe, and North and South America were carried out to address this gap. Results from the focus groups led to four significant findings: (1) there is a confirmed need for a systematic evaluation of tools and data used in national CSIRTs, (2) there is a lack of a generally accepted standard procedure for evaluating tools and data in national CSIRTs, (3) there is a general agreement among all focus group participants regarding the challenges that impinge a systematic evaluation of tools and data by national CSIRTs, and (4) we identified a list of candidate criteria that can help inform the design of a standard procedure for evaluating tools and data by national CSIRTs. Based on our findings, we call on the cyber security community and national CSIRTs to develop standard procedures and criteria for evaluating tools and data that CSIRTs, in general, can use.
世界各地已经建立了国家计算机安全事件响应小组(csirt),以协调国家一级对计算机安全事件的响应。虽然众所周知,国家csirt通常在网络事件调查中使用不同类型的工具和来自不同来源的数据,但关于国家csirt如何评估和选择用于事件响应的工具和数据的研究有限。这样的评估对于确保这些工具和数据具有良好的质量非常重要,从而有助于提高事件响应过程的有效性和事件响应调查的质量。为了解决这一差距,我们与来自非洲、亚太、欧洲、北美和南美的15个国家csirt的20名参与者(所有工作人员)进行了7次在线焦点小组讨论。焦点小组的结果有四个重要发现:(1)确认需要对国家csirt中使用的工具和数据进行系统评估;(2)缺乏普遍接受的评估国家csirt中工具和数据的标准程序;(3)所有焦点小组参与者都对影响国家csirt对工具和数据进行系统评估的挑战达成了普遍共识。(4)我们确定了候选标准列表,这些标准可以帮助为国家csirt评估工具和数据的标准程序的设计提供信息。基于我们的研究结果,我们呼吁网络安全社区和国家csirt制定标准程序和标准,以评估csirt通常可以使用的工具和数据。
{"title":"Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions","authors":"Sharifah Roziah Mohd Kassim, Shujun Li, B. Arief","doi":"10.1145/3609230","DOIUrl":"https://doi.org/10.1145/3609230","url":null,"abstract":"National Computer Security Incident Response Teams (CSIRTs) have been established worldwide to coordinate responses to computer security incidents at the national level. While it is known that national CSIRTs routinely use different types of tools and data from various sources in their cyber incident investigations, limited studies are available about how national CSIRTs evaluate and choose which tools and data to use for incident response. Such an evaluation is important to ensure that these tools and data are of good quality and, consequently, help to increase the effectiveness of the incident response process and the quality of incident response investigations. Seven online focus group discussions with 20 participants (all staff members) from 15 national CSIRTs across Africa, Asia Pacific, Europe, and North and South America were carried out to address this gap. Results from the focus groups led to four significant findings: (1) there is a confirmed need for a systematic evaluation of tools and data used in national CSIRTs, (2) there is a lack of a generally accepted standard procedure for evaluating tools and data in national CSIRTs, (3) there is a general agreement among all focus group participants regarding the challenges that impinge a systematic evaluation of tools and data by national CSIRTs, and (4) we identified a list of candidate criteria that can help inform the design of a standard procedure for evaluating tools and data by national CSIRTs. Based on our findings, we call on the cyber security community and national CSIRTs to develop standard procedures and criteria for evaluating tools and data that CSIRTs, in general, can use.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125556875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Functional Classification of Forensic Access to Storage and its Legal Implications 法医获取存储的功能分类及其法律意义
Pub Date : 2023-07-14 DOI: 10.1145/3609231
Andreas Hammer, Mathis Ohlig, J. Geus, F. Freiling
Due to their ease of use and their reliability, managed storage services in the cloud have become a standard way to store files for many users. Consequently, data from cloud storage services and remote file systems in general is an increasingly valuable source of digital evidence in forensic investigations. In this respect, two questions appear relevant: (1) What effect does data acquisition by the client have on the data stored on the server? (2) Does the technology support delayed verification of data acquisition? The two questions refer to critical aspects of forensic evidence collection, namely, in what way does evidence collection interfere with the evidence, and how easy is it to prove the provenance of data in a forensic investigation. We formalize the above questions and use this formalization to classify common storage services. We argue that this classification has direct consequences with regard to the probative value of data acquired from them. We, therefore, discuss the legal implications of this classification with regard to probative value so that IT expert witnesses can adapt their procedures during evidence acquisition and legal practitioners know how to assess such procedures and the evidence obtained through them from cloud storage services.
由于其易用性和可靠性,云中的托管存储服务已成为许多用户存储文件的标准方式。因此,来自云存储服务和远程文件系统的数据通常是法医调查中越来越有价值的数字证据来源。在这方面,两个问题似乎是相关的:(1)客户端的数据采集对存储在服务器上的数据有什么影响?(2)该技术是否支持数据采集的延迟验证?这两个问题涉及法医证据收集的关键方面,即证据收集以何种方式干扰证据,以及在法医调查中证明数据来源的难易程度。我们将上述问题形式化,并使用这种形式化对公共存储服务进行分类。我们认为,这种分类对从他们那里获得的数据的证明价值有直接的影响。因此,我们讨论了这种分类对证据价值的法律影响,以便IT专家证人可以在取证过程中调整他们的程序,法律从业人员知道如何评估这些程序以及通过这些程序从云存储服务中获得的证据。
{"title":"A Functional Classification of Forensic Access to Storage and its Legal Implications","authors":"Andreas Hammer, Mathis Ohlig, J. Geus, F. Freiling","doi":"10.1145/3609231","DOIUrl":"https://doi.org/10.1145/3609231","url":null,"abstract":"Due to their ease of use and their reliability, managed storage services in the cloud have become a standard way to store files for many users. Consequently, data from cloud storage services and remote file systems in general is an increasingly valuable source of digital evidence in forensic investigations. In this respect, two questions appear relevant: (1) What effect does data acquisition by the client have on the data stored on the server? (2) Does the technology support delayed verification of data acquisition? The two questions refer to critical aspects of forensic evidence collection, namely, in what way does evidence collection interfere with the evidence, and how easy is it to prove the provenance of data in a forensic investigation. We formalize the above questions and use this formalization to classify common storage services. We argue that this classification has direct consequences with regard to the probative value of data acquired from them. We, therefore, discuss the legal implications of this classification with regard to probative value so that IT expert witnesses can adapt their procedures during evidence acquisition and legal practitioners know how to assess such procedures and the evidence obtained through them from cloud storage services.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134016883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Back and Forth—On Automatic Exposure of Origin and Dissemination of Files on Windows 来回-自动曝光的来源和传播的文件在Windows上
Pub Date : 2023-07-14 DOI: 10.1145/3609232
Samantha Klier, Janneke Varenkamp, Harald Baier
The number of Child Sexual Abuse Material (CSAM) cases has increased dramatically in recent years. This leads to the need to automate various steps in digital forensic processing, especially for CSAM investigations. For instance, if CSAM pictures are found on a device, the investigator aim at finding traces about the origin and possible further dissemination, respectively. In this article, we address this challenge with respect to the widespread Windows operating system. We model different common scenarios of system use by CSAM offenders in the scope of file inbound and outbound transfer channels. This gives us insights about digital traces in the Windows operating system and its applications to get knowledge about origin and possible destination of a file. We review available concepts and applications to support this issue. Furthermore, we develop a recursive-based approach and provide a prototype as plugin for the open source application Autopsy. We call our prototype AutoTrack. Our evaluation against the different models of Windows system usage reveals that Autotrack is superior to existing solutions and provides support for an investigator to find digital traces about the origin and possible further dissemination of files. We publish our AutoTrack plugin and thus provide full reproducibility of our approach.
近年来,儿童性虐待材料(CSAM)案件的数量急剧增加。这导致需要自动化数字取证处理中的各个步骤,特别是对于CSAM调查。例如,如果在一个设备上发现了CSAM图像,调查人员的目标是分别找到关于起源和可能进一步传播的痕迹。在本文中,我们将针对广泛使用的Windows操作系统解决这一挑战。我们在文件入站和出站传输通道范围内对CSAM违法者使用系统的不同常见场景进行了建模。这使我们能够深入了解Windows操作系统及其应用程序中的数字痕迹,从而了解文件的来源和可能的目的地。我们回顾了可用的概念和应用程序来支持这个问题。此外,我们开发了一种基于递归的方法,并为开源应用程序尸检提供了一个原型作为插件。我们称我们的原型为AutoTrack。我们对Windows系统使用的不同模型的评估表明,Autotrack优于现有的解决方案,并为调查人员提供了关于文件起源和可能进一步传播的数字痕迹的支持。我们发布了我们的AutoTrack插件,从而提供了我们方法的完全再现性。
{"title":"Back and Forth—On Automatic Exposure of Origin and Dissemination of Files on Windows","authors":"Samantha Klier, Janneke Varenkamp, Harald Baier","doi":"10.1145/3609232","DOIUrl":"https://doi.org/10.1145/3609232","url":null,"abstract":"The number of Child Sexual Abuse Material (CSAM) cases has increased dramatically in recent years. This leads to the need to automate various steps in digital forensic processing, especially for CSAM investigations. For instance, if CSAM pictures are found on a device, the investigator aim at finding traces about the origin and possible further dissemination, respectively. In this article, we address this challenge with respect to the widespread Windows operating system. We model different common scenarios of system use by CSAM offenders in the scope of file inbound and outbound transfer channels. This gives us insights about digital traces in the Windows operating system and its applications to get knowledge about origin and possible destination of a file. We review available concepts and applications to support this issue. Furthermore, we develop a recursive-based approach and provide a prototype as plugin for the open source application Autopsy. We call our prototype AutoTrack. Our evaluation against the different models of Windows system usage reveals that Autotrack is superior to existing solutions and provides support for an investigator to find digital traces about the origin and possible further dissemination of files. We publish our AutoTrack plugin and thus provide full reproducibility of our approach.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123328977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LAVA: Log Authentication and Verification Algorithm LAVA:日志认证和验证算法
Pub Date : 2023-07-13 DOI: 10.1145/3609233
Edita Bajramovic, Christofer Fein, Marius Frinken, Paul Rösler, F. Freiling
Log files provide essential information regarding the actions of processes in critical computer systems. If an attacker modifies log entries, then critical digital evidence is lost. Therefore, many algorithms for secure logging have been devised, each achieving different security goals under different assumptions. We analyze these algorithms and identify their essential security features. Within a common system and attacker model, we integrate these algorithms into a single (parameterizable) “meta” algorithm called LAVA that possesses the union of the security features and can be parameterized to yield the security features of former algorithms. We present a security and efficiency analysis and provide a Python module that can be used to provide secure logging for forensics and incident response.
日志文件提供了关键计算机系统中进程运行的基本信息。如果攻击者修改了日志条目,那么关键的数字证据就会丢失。因此,人们设计了许多安全日志记录算法,每种算法在不同的假设下实现不同的安全目标。我们分析了这些算法,并确定了它们的基本安全特性。在一个通用的系统和攻击者模型中,我们将这些算法集成到一个称为LAVA的单一(可参数化的)“元”算法中,该算法具有安全特征的联合,并且可以参数化以产生以前算法的安全特征。我们提供了安全性和效率分析,并提供了一个Python模块,该模块可用于为取证和事件响应提供安全日志记录。
{"title":"LAVA: Log Authentication and Verification Algorithm","authors":"Edita Bajramovic, Christofer Fein, Marius Frinken, Paul Rösler, F. Freiling","doi":"10.1145/3609233","DOIUrl":"https://doi.org/10.1145/3609233","url":null,"abstract":"Log files provide essential information regarding the actions of processes in critical computer systems. If an attacker modifies log entries, then critical digital evidence is lost. Therefore, many algorithms for secure logging have been devised, each achieving different security goals under different assumptions. We analyze these algorithms and identify their essential security features. Within a common system and attacker model, we integrate these algorithms into a single (parameterizable) “meta” algorithm called LAVA that possesses the union of the security features and can be parameterized to yield the security features of former algorithms. We present a security and efficiency analysis and provide a Python module that can be used to provide secure logging for forensics and incident response.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130016059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Formal Treatment of Expressiveness and Relevanceof Digital Evidence 数字证据的表达性和相关性的形式化处理
Pub Date : 2023-07-13 DOI: 10.1145/3608485
Jan Gruber, Merlin Humml
Digital investigations are largely concerned with reconstructing past events based on traces in digital systems. Given their importance, many concepts have been established to describe their quality—most of them concerned with procedural aspects, i.e., authenticity and integrity, for example. Besides that, there exist principal concepts that have been overlooked in the past: Two of those criteria are relevance and expressiveness of digital evidence. Unlike others, those are directly concerned with reaching the investigative goal. Therefore, we approach these two overlooked concepts of digital evidence by giving formal definitions. To illustrate the usefulness, we present two applications: First, we demonstrate that the notions of expressiveness and completeness can be used to guide investigations by presenting the Facet-oriented Criminalistic Cycle as a thinking model, which extends the well-established criminalistic cycle. Second, we put the concepts into practice by calculating the expressiveness of facets from a state machine representation of a digital system utilizing temporal logic and a model checker. Furthermore, we sketch out the implications of this improved way of defining relevance and expressiveness. Accordingly, this article aims to improve the understanding of these critical aspects of the overall investigative process.
数字调查主要是基于数字系统中的痕迹重建过去的事件。鉴于其重要性,已经建立了许多概念来描述其质量,其中大多数涉及程序方面,例如,真实性和完整性。除此之外,还有一些过去被忽视的主要概念:其中两个标准是数字证据的相关性和表达性。与其他案件不同,这些案件与达成调查目标直接相关。因此,我们通过给出正式定义来接近这两个被忽视的数字证据概念。为了说明有用性,我们提出了两个应用:首先,我们证明了表达性和完整性的概念可以用来指导调查,通过提出面向方面的犯罪循环作为一种思维模式,它扩展了已经建立的犯罪循环。其次,我们通过利用时间逻辑和模型检查器从数字系统的状态机表示中计算facet的表达性,将这些概念付诸实践。此外,我们还概述了这种改进的定义相关性和表达性的方法的含义。因此,本文旨在提高对整个调查过程中这些关键方面的理解。
{"title":"A Formal Treatment of Expressiveness and Relevanceof Digital Evidence","authors":"Jan Gruber, Merlin Humml","doi":"10.1145/3608485","DOIUrl":"https://doi.org/10.1145/3608485","url":null,"abstract":"Digital investigations are largely concerned with reconstructing past events based on traces in digital systems. Given their importance, many concepts have been established to describe their quality—most of them concerned with procedural aspects, i.e., authenticity and integrity, for example. Besides that, there exist principal concepts that have been overlooked in the past: Two of those criteria are relevance and expressiveness of digital evidence. Unlike others, those are directly concerned with reaching the investigative goal. Therefore, we approach these two overlooked concepts of digital evidence by giving formal definitions. To illustrate the usefulness, we present two applications: First, we demonstrate that the notions of expressiveness and completeness can be used to guide investigations by presenting the Facet-oriented Criminalistic Cycle as a thinking model, which extends the well-established criminalistic cycle. Second, we put the concepts into practice by calculating the expressiveness of facets from a state machine representation of a digital system utilizing temporal logic and a model checker. Furthermore, we sketch out the implications of this improved way of defining relevance and expressiveness. Accordingly, this article aims to improve the understanding of these critical aspects of the overall investigative process.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133783835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
security.txt Revisited: Analysis of Prevalence and Conformity in 2022 重访:2022年的流行与一致性分析
Pub Date : 2023-07-13 DOI: 10.1145/3609234
Tobias Hilbig, Thomas Geras, Erwin Kupris, T. Schreck
Determining the correct contact person for a particular system or organization is challenging in today’s Internet architecture. However, there are various stakeholders who will need to have such information, such as national security teams, security researchers, or Internet service providers, among others. To address this problem, RFC 9116, or better known as “security.txt,” was developed. If implemented correctly, then it can help these stakeholders in finding contact information to be used to notify an organization of any security issues. Further, there is another proposal called “dnssecuritytxt,” which uses DNS records for this purpose. In this research article, we evaluated the prevalence of websites that have implemented security.txt and their conformity with the standard. Through a longitudinal analysis of the top one million websites, we investigated the adoption and usage of this standard among organizations. Our results show that the overall adoption of security.txt remains low, especially among less popular websites. To drive its acceptance among organizations, security researchers, and developers, we derived several recommendations, including partnerships with vendors of browsers and content management systems.
在当今的Internet架构中,为特定系统或组织确定正确的联系人是一项挑战。然而,有各种各样的利益相关者需要这些信息,例如国家安全团队、安全研究人员或互联网服务提供商等。为了解决这个问题,开发了RFC 9116,或者更广为人知的“security.txt”。如果实现正确,那么它可以帮助这些涉众找到联系信息,用于通知组织任何安全问题。此外,还有另一个名为“dnssecuritytxt”的建议,该建议将DNS记录用于此目的。在这篇研究文章中,我们评估了实施security.txt的网站的流行程度及其与标准的一致性。通过对排名前100万个网站的纵向分析,我们调查了组织对该标准的采用和使用情况。我们的研究结果显示,security.txt的总体使用率仍然很低,尤其是在不太受欢迎的网站中。为了推动组织、安全研究人员和开发人员接受它,我们提出了一些建议,包括与浏览器和内容管理系统供应商合作。
{"title":"security.txt Revisited: Analysis of Prevalence and Conformity in 2022","authors":"Tobias Hilbig, Thomas Geras, Erwin Kupris, T. Schreck","doi":"10.1145/3609234","DOIUrl":"https://doi.org/10.1145/3609234","url":null,"abstract":"Determining the correct contact person for a particular system or organization is challenging in today’s Internet architecture. However, there are various stakeholders who will need to have such information, such as national security teams, security researchers, or Internet service providers, among others. To address this problem, RFC 9116, or better known as “security.txt,” was developed. If implemented correctly, then it can help these stakeholders in finding contact information to be used to notify an organization of any security issues. Further, there is another proposal called “dnssecuritytxt,” which uses DNS records for this purpose. In this research article, we evaluated the prevalence of websites that have implemented security.txt and their conformity with the standard. Through a longitudinal analysis of the top one million websites, we investigated the adoption and usage of this standard among organizations. Our results show that the overall adoption of security.txt remains low, especially among less popular websites. To drive its acceptance among organizations, security researchers, and developers, we derived several recommendations, including partnerships with vendors of browsers and content management systems.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123497776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HiPeR - Early Detection of a Ransomware Attack using Hardware Performance Counters 利用硬件性能计数器早期检测勒索软件攻击
Pub Date : 2023-07-11 DOI: 10.1145/3608484
P. Anand, P. Charan, S. Shukla
Ransomware has been one of the most prevalent forms of malware over the previous decade, and it continues to be one of the most significant threats today. Recently, ransomware strategies such as double extortion and rapid encryption have encouraged attacker communities to consider ransomware as a business model. With the advent of Ransomware as a Service (RaaS) models, ransomware spread and operations continue to increase. Even though machine learning and signature-based detection methods for ransomware have been proposed, they often fail to achieve very accurate detection. Ransomware that evades detection moves to the execution phase after initial access and installation. Due to the catastrophic nature of a ransomware attack, it is crucial to detect in its early stages of execution. If there is a method to detect ransomware in its execution phase early enough, then one can kill the processes to stop the ransomware attack. However, early detection with dynamic API call analysis is not an ideal solution, as the contemporary ransomware variants use low-level system calls to circumvent the detection methods. In this work, we use hardware performance counters (HPC) as features to detect the ransomware within 3-4 seconds - which may be sufficient, at least in the case of ransomware that takes longer to complete its full execution.
在过去十年中,勒索软件一直是最普遍的恶意软件形式之一,并且它仍然是当今最重大的威胁之一。最近,双重勒索和快速加密等勒索软件策略鼓励攻击者社区将勒索软件视为一种商业模式。随着勒索软件即服务(RaaS)模型的出现,勒索软件的传播和操作不断增加。尽管已经提出了针对勒索软件的机器学习和基于签名的检测方法,但它们往往无法实现非常准确的检测。勒索软件在初始访问和安装后,逃避检测进入执行阶段。由于勒索软件攻击的灾难性性质,在其执行的早期阶段进行检测至关重要。如果有一种方法可以在勒索软件的执行阶段足够早地检测到它,那么就可以杀死进程来阻止勒索软件的攻击。然而,通过动态API调用分析进行早期检测并不是一个理想的解决方案,因为当代勒索软件变体使用低级系统调用来规避检测方法。在这项工作中,我们使用硬件性能计数器(HPC)作为特征,在3-4秒内检测勒索软件-这可能是足够的,至少在勒索软件需要更长的时间才能完成其完整执行的情况下。
{"title":"HiPeR - Early Detection of a Ransomware Attack using Hardware Performance Counters","authors":"P. Anand, P. Charan, S. Shukla","doi":"10.1145/3608484","DOIUrl":"https://doi.org/10.1145/3608484","url":null,"abstract":"Ransomware has been one of the most prevalent forms of malware over the previous decade, and it continues to be one of the most significant threats today. Recently, ransomware strategies such as double extortion and rapid encryption have encouraged attacker communities to consider ransomware as a business model. With the advent of Ransomware as a Service (RaaS) models, ransomware spread and operations continue to increase. Even though machine learning and signature-based detection methods for ransomware have been proposed, they often fail to achieve very accurate detection. Ransomware that evades detection moves to the execution phase after initial access and installation. Due to the catastrophic nature of a ransomware attack, it is crucial to detect in its early stages of execution. If there is a method to detect ransomware in its execution phase early enough, then one can kill the processes to stop the ransomware attack. However, early detection with dynamic API call analysis is not an ideal solution, as the contemporary ransomware variants use low-level system calls to circumvent the detection methods. In this work, we use hardware performance counters (HPC) as features to detect the ransomware within 3-4 seconds - which may be sufficient, at least in the case of ransomware that takes longer to complete its full execution.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132911082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Special Issue on Actionable Information for Digital Threat Discovery Using Contextualized Data or Multi Sensor Data Fusion 使用情境化数据或多传感器数据融合的数字威胁发现的可操作信息特刊
Pub Date : 2023-06-30 DOI: 10.1145/3585079
S. S. Iyengar, B. Thuraisingham, Marek Zmuda
Many of the services offered in this electronic era depend on the detection and manipulation of sensor data. The data that is gathered is, however, extremely susceptible to leakage, malicious modification, violation of confidentiality and integrity, and other assaults. Data security is a major issue, and the sensitive sensor data can be compromised either at the source of creation or when it is in transit through the various containers that carry this information for the many services. Determining the context of the information and using that to protect it from digital threats by assessing and skillfully modifying them is thus necessary to close the gap we now have. The complexity is increased by the absence of security standards in the world of sensing devices, which demand the development of technical solutions that can serve as countermeasures. This special issue has two major contributions:
在这个电子时代提供的许多服务都依赖于传感器数据的检测和操作。然而,收集到的数据非常容易泄露、恶意修改、违反机密性和完整性以及其他攻击。数据安全是一个主要问题,敏感的传感器数据可能在创建源处或通过为许多服务携带这些信息的各种容器进行传输时遭到破坏。因此,确定信息的上下文,并通过评估和熟练地修改信息来保护信息免受数字威胁,这对于缩小我们目前的差距是必要的。由于传感设备领域缺乏安全标准,因此需要开发可以作为对策的技术解决方案,从而增加了复杂性。本期特刊有两大贡献:
{"title":"Special Issue on Actionable Information for Digital Threat Discovery Using Contextualized Data or Multi Sensor Data Fusion","authors":"S. S. Iyengar, B. Thuraisingham, Marek Zmuda","doi":"10.1145/3585079","DOIUrl":"https://doi.org/10.1145/3585079","url":null,"abstract":"Many of the services offered in this electronic era depend on the detection and manipulation of sensor data. The data that is gathered is, however, extremely susceptible to leakage, malicious modification, violation of confidentiality and integrity, and other assaults. Data security is a major issue, and the sensitive sensor data can be compromised either at the source of creation or when it is in transit through the various containers that carry this information for the many services. Determining the context of the information and using that to protect it from digital threats by assessing and skillfully modifying them is thus necessary to close the gap we now have. The complexity is increased by the absence of security standards in the world of sensing devices, which demand the development of technical solutions that can serve as countermeasures. This special issue has two major contributions:","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129329807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Know Thy Ransomware Response: A Detailed Framework for Devising Effective Ransomware Response Strategies 了解你的勒索软件响应:设计有效的勒索软件响应策略的详细框架
Pub Date : 2023-06-26 DOI: 10.1145/3606022
Pranshu Bajpai, R. Enbody
Ransomware have evolved into one of the most severe cyberthreats against private and public sector alike. Organizations are inundated with a barrage of intrusion attempts that ultimately morph into full-scale ransomware attacks. Efforts to combat these threats tend to primarily focus on detection and prevention and while thwarting an attack is always the best approach, we must additionally improve our response and recovery efforts with a post-breach mindset. Assume that the defenses have failed and the risk has materialized. Are we then prepared to best salvage the situation with efficient, ransomware-specific incident response procedures? In this work, we present a ransomware response framework that can be leveraged to create highly effective ransomware response strategies. We provide a level of detail in this framework that balances adaptability versus actionability that both technical and executive stakeholders will find of use.
勒索软件已经发展成为针对私营和公共部门的最严重的网络威胁之一。组织被大量的入侵企图淹没,最终演变成全面的勒索软件攻击。打击这些威胁的努力往往主要集中在检测和预防上,虽然阻止攻击始终是最好的方法,但我们还必须以泄露后的心态提高我们的响应和恢复工作。假设防御已经失效,风险已经成为现实。那么,我们是否准备好了用有效的、针对勒索软件的事件响应程序来最好地挽救局面呢?在这项工作中,我们提出了一个勒索软件响应框架,可以用来创建高效的勒索软件响应策略。我们在这个框架中提供了一定程度的细节,以平衡适应性与可操作性,技术涉众和执行涉众都将从中受益。
{"title":"Know Thy Ransomware Response: A Detailed Framework for Devising Effective Ransomware Response Strategies","authors":"Pranshu Bajpai, R. Enbody","doi":"10.1145/3606022","DOIUrl":"https://doi.org/10.1145/3606022","url":null,"abstract":"Ransomware have evolved into one of the most severe cyberthreats against private and public sector alike. Organizations are inundated with a barrage of intrusion attempts that ultimately morph into full-scale ransomware attacks. Efforts to combat these threats tend to primarily focus on detection and prevention and while thwarting an attack is always the best approach, we must additionally improve our response and recovery efforts with a post-breach mindset. Assume that the defenses have failed and the risk has materialized. Are we then prepared to best salvage the situation with efficient, ransomware-specific incident response procedures? In this work, we present a ransomware response framework that can be leveraged to create highly effective ransomware response strategies. We provide a level of detail in this framework that balances adaptability versus actionability that both technical and executive stakeholders will find of use.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126791530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Attack Detection in Multimodal Cyber-Physical Systems with Sticky HDP-HMM based Time Series Analysis 基于粘性HDP-HMM时间序列分析的多模态网络物理系统攻击检测
Pub Date : 2023-06-17 DOI: 10.1145/3604434
Andrew E. Hong, P. Malinovsky, Suresh Damodaran
Automatic detection of the precise occurrence and duration of an attack reflected in time-series logs generated by cyber-physical systems is a challenging problem. This problem is exacerbated when performing this analysis using logs with limited system information. In a realistic scenario, multiple and differing attack methods may be employed in rapid succession. Modern or legacy systems operate in multiple modes and contain multiple devices recording a variety of continuous and categorical data streams. This work presents a non-parametric Bayesian framework that addresses these challenges using the sticky Hierarchical Dirichlet Process Hidden Markov Model (sHDP-HMM). Additionally, we explore metrics for measuring the accuracy of the detected events: their timings and durations and compares the computational efficiency of different inference implementations of the model. The efficacy of attack detection is demonstrated in two settings: an avionics testbed and a consumer robot.
自动检测由网络物理系统生成的时间序列日志所反映的攻击的精确发生和持续时间是一个具有挑战性的问题。当使用具有有限系统信息的日志执行此分析时,这个问题会更加严重。在现实场景中,多种不同的攻击方法可能会快速连续使用。现代或传统系统以多种模式运行,并包含多个设备,记录各种连续和分类数据流。这项工作提出了一个非参数贝叶斯框架,该框架使用粘性分层狄利克雷过程隐马尔可夫模型(sHDP-HMM)来解决这些挑战。此外,我们还探讨了测量检测到的事件的准确性的指标:它们的时间和持续时间,并比较了模型的不同推理实现的计算效率。攻击检测的有效性在两种设置中进行了验证:航空电子试验台和消费机器人。
{"title":"Towards Attack Detection in Multimodal Cyber-Physical Systems with Sticky HDP-HMM based Time Series Analysis","authors":"Andrew E. Hong, P. Malinovsky, Suresh Damodaran","doi":"10.1145/3604434","DOIUrl":"https://doi.org/10.1145/3604434","url":null,"abstract":"Automatic detection of the precise occurrence and duration of an attack reflected in time-series logs generated by cyber-physical systems is a challenging problem. This problem is exacerbated when performing this analysis using logs with limited system information. In a realistic scenario, multiple and differing attack methods may be employed in rapid succession. Modern or legacy systems operate in multiple modes and contain multiple devices recording a variety of continuous and categorical data streams. This work presents a non-parametric Bayesian framework that addresses these challenges using the sticky Hierarchical Dirichlet Process Hidden Markov Model (sHDP-HMM). Additionally, we explore metrics for measuring the accuracy of the detected events: their timings and durations and compares the computational efficiency of different inference implementations of the model. The efficacy of attack detection is demonstrated in two settings: an avionics testbed and a consumer robot.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122356709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Digital Threats: Research and Practice
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1