首页 > 最新文献

Digital Threats: Research and Practice最新文献

英文 中文
LGuard: Securing Enterprise-IoT Systems against Serial-Based Attacks via Proprietary Communication Buses LGuard:通过专有通信总线保护企业物联网系统免受串行攻击
Pub Date : 2022-09-14 DOI: 10.1145/3555721
Luis Puche Rondon, Leonardo Babun, Ahmet Aris, K. Akkaya, A. Uluagac
Enterprise Internet of Things (E-IoT) systems allow users to control audio, video, scheduled events, lightning fixtures, door access, and relays in complex smart installations. These systems are widely used in government or smart private offices, smart buildings/homes, conference rooms, schools, hotels, and similar professional settings. However, even with their widespread use, the security of many E-IoT systems and components has not been researched in the literature. To address this research gap, we focus on E-IoT communication buses, one of the core components used to connect E-IoT devices, and introduce LightningStrike attacks that demonstrate several weaknesses with E-IoT proprietary communication protocols used in E-IoT communication buses. Specifically, we show that popular E-IoT proprietary communication protocols are susceptible to Denial-of-Service (DoS), eavesdropping, impersonation, and replay attacks. As such threats cannot be mitigated through traditional defense mechanisms due to the limitations posed by E-IoT, we propose LGuard, a defense system to protect E-IoT systems against the attacks over communication buses. LGuard uses closed-circuit television footage and computer vision techniques to detect replay attacks. For impersonation and DoS attacks, LGuard utilizes traffic analysis. Finally, LGuard obfuscates the E-IoT traffic via inserting redundant traffic to the bus against eavesdropping attacks. We evaluated the performance of LGuard in a realistic E-IoT deployment, and our detailed evaluations show that LGuard achieves an overall accuracy and precision of 99% in detecting DoS, impersonation, and replay attacks while effectively increasing the difficulty of extracting valuable information for eavesdroppers. In addition, LGuard does not incur any operational overhead or modification to the existing E-IoT system.
企业物联网(E-IoT)系统允许用户在复杂的智能安装中控制音频、视频、计划事件、闪电装置、门禁和继电器。这些系统广泛应用于政府或智能私人办公室、智能建筑/家庭、会议室、学校、酒店和类似的专业环境。然而,即使它们被广泛使用,许多E-IoT系统和组件的安全性还没有在文献中得到研究。为了解决这一研究差距,我们将重点放在E-IoT通信总线上,这是用于连接E-IoT设备的核心组件之一,并介绍了闪电攻击,该攻击展示了E-IoT通信总线中使用的E-IoT专有通信协议的几个弱点。具体来说,我们表明流行的E-IoT专有通信协议容易受到拒绝服务(DoS)、窃听、冒充和重放攻击的影响。由于电子物联网的局限性,这种威胁无法通过传统的防御机制来缓解,因此我们提出了LGuard防御系统,以保护电子物联网系统免受通信总线上的攻击。LGuard使用闭路电视镜头和计算机视觉技术来检测重放攻击。对于模拟和DoS攻击,LGuard使用流量分析。最后,LGuard通过在总线上插入冗余流量来混淆E-IoT流量,以防止窃听攻击。我们在现实的E-IoT部署中评估了LGuard的性能,我们的详细评估表明,LGuard在检测DoS、模拟和重放攻击方面达到了99%的总体准确度和精度,同时有效地增加了为窃听者提取有价值信息的难度。此外,LGuard不会产生任何操作开销,也不会对现有的E-IoT系统进行修改。
{"title":"LGuard: Securing Enterprise-IoT Systems against Serial-Based Attacks via Proprietary Communication Buses","authors":"Luis Puche Rondon, Leonardo Babun, Ahmet Aris, K. Akkaya, A. Uluagac","doi":"10.1145/3555721","DOIUrl":"https://doi.org/10.1145/3555721","url":null,"abstract":"Enterprise Internet of Things (E-IoT) systems allow users to control audio, video, scheduled events, lightning fixtures, door access, and relays in complex smart installations. These systems are widely used in government or smart private offices, smart buildings/homes, conference rooms, schools, hotels, and similar professional settings. However, even with their widespread use, the security of many E-IoT systems and components has not been researched in the literature. To address this research gap, we focus on E-IoT communication buses, one of the core components used to connect E-IoT devices, and introduce LightningStrike attacks that demonstrate several weaknesses with E-IoT proprietary communication protocols used in E-IoT communication buses. Specifically, we show that popular E-IoT proprietary communication protocols are susceptible to Denial-of-Service (DoS), eavesdropping, impersonation, and replay attacks. As such threats cannot be mitigated through traditional defense mechanisms due to the limitations posed by E-IoT, we propose LGuard, a defense system to protect E-IoT systems against the attacks over communication buses. LGuard uses closed-circuit television footage and computer vision techniques to detect replay attacks. For impersonation and DoS attacks, LGuard utilizes traffic analysis. Finally, LGuard obfuscates the E-IoT traffic via inserting redundant traffic to the bus against eavesdropping attacks. We evaluated the performance of LGuard in a realistic E-IoT deployment, and our detailed evaluations show that LGuard achieves an overall accuracy and precision of 99% in detecting DoS, impersonation, and replay attacks while effectively increasing the difficulty of extracting valuable information for eavesdroppers. In addition, LGuard does not incur any operational overhead or modification to the existing E-IoT system.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121300431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Analysis of Zigbee Protocol Implementation via Device-agnostic Fuzzing 基于设备不可知模糊测试实现Zigbee协议的安全性分析
Pub Date : 2022-09-14 DOI: 10.1145/3551894
Mengfei Ren, Xiaolei Ren, Huadong Feng, Jiang Ming, Yu Lei
Zigbee is widely adopted as a resource-efficient wireless protocol in the IoT network. IoT devices from manufacturers have recently been affected due to major vulnerabilities in Zigbee protocol implementations. Security testing of Zigbee protocol implementations is becoming increasingly important. However, applying existing vulnerability detection techniques such as fuzzing to the Zigbee protocol is not a simple task. Dealing with low-level hardware events still remains a big challenge. For the Zigbee protocol, which communicates over a radio channel, many existing protocol fuzzing tools lack a sufficient execution environment. To narrow the gap, we designed Z-Fuzzer, a device-agnostic fuzzing tool for detecting security flaws in Zigbee protocol implementations. To simulate Zigbee protocol execution, Z-Fuzzer leverages a commercial embedded device simulator with pre-defined peripherals and hardware interrupt setups to interact with the fuzzing engine. Z-Fuzzer generates more high-quality test cases with code-coverage heuristics. We compare Z-Fuzzer with advanced protocol fuzzing tools, BooFuzz and Peach fuzzer, on top of Z-Fuzzer’s simulation platform. Our findings suggest that Z-Fuzzer can achieve greater code coverage in Z-Stack, a widely used Zigbee protocol implementation. Compared to BooFuzz and Peach, Z-Fuzzer found more vulnerabilities with fewer test cases. Three of them have been assigned CVE IDs with high CVSS scores (7.5~8.2).
Zigbee作为一种资源高效的无线协议在物联网网络中被广泛采用。由于Zigbee协议实现中的重大漏洞,制造商的物联网设备最近受到了影响。Zigbee协议实现的安全测试变得越来越重要。然而,将现有的漏洞检测技术(如模糊检测)应用于Zigbee协议并不是一项简单的任务。处理低级硬件事件仍然是一个很大的挑战。对于通过无线信道进行通信的Zigbee协议,许多现有的协议模糊测试工具缺乏足够的执行环境。为了缩小差距,我们设计了Z-Fuzzer,这是一种设备无关的模糊测试工具,用于检测Zigbee协议实现中的安全漏洞。为了模拟Zigbee协议的执行,Z-Fuzzer利用具有预定义外设和硬件中断设置的商业嵌入式设备模拟器与模糊测试引擎进行交互。Z-Fuzzer使用代码覆盖启发式生成更多高质量的测试用例。在Z-Fuzzer的仿真平台上,我们将Z-Fuzzer与先进的协议模糊工具BooFuzz和Peach fuzzer进行了比较。我们的研究结果表明,Z-Fuzzer可以在Z-Stack(一种广泛使用的Zigbee协议实现)中实现更大的代码覆盖率。与BooFuzz和Peach相比,Z-Fuzzer用更少的测试用例发现了更多的漏洞。其中3例已获得CVSS评分较高(7.5~8.2)的CVE id。
{"title":"Security Analysis of Zigbee Protocol Implementation via Device-agnostic Fuzzing","authors":"Mengfei Ren, Xiaolei Ren, Huadong Feng, Jiang Ming, Yu Lei","doi":"10.1145/3551894","DOIUrl":"https://doi.org/10.1145/3551894","url":null,"abstract":"Zigbee is widely adopted as a resource-efficient wireless protocol in the IoT network. IoT devices from manufacturers have recently been affected due to major vulnerabilities in Zigbee protocol implementations. Security testing of Zigbee protocol implementations is becoming increasingly important. However, applying existing vulnerability detection techniques such as fuzzing to the Zigbee protocol is not a simple task. Dealing with low-level hardware events still remains a big challenge. For the Zigbee protocol, which communicates over a radio channel, many existing protocol fuzzing tools lack a sufficient execution environment. To narrow the gap, we designed Z-Fuzzer, a device-agnostic fuzzing tool for detecting security flaws in Zigbee protocol implementations. To simulate Zigbee protocol execution, Z-Fuzzer leverages a commercial embedded device simulator with pre-defined peripherals and hardware interrupt setups to interact with the fuzzing engine. Z-Fuzzer generates more high-quality test cases with code-coverage heuristics. We compare Z-Fuzzer with advanced protocol fuzzing tools, BooFuzz and Peach fuzzer, on top of Z-Fuzzer’s simulation platform. Our findings suggest that Z-Fuzzer can achieve greater code coverage in Z-Stack, a widely used Zigbee protocol implementation. Compared to BooFuzz and Peach, Z-Fuzzer found more vulnerabilities with fewer test cases. Three of them have been assigned CVE IDs with high CVSS scores (7.5~8.2).","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128439607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
APTHunter: Detecting Advanced Persistent Threats in Early Stages APTHunter:在早期阶段检测高级持续威胁
Pub Date : 2022-09-02 DOI: 10.1145/3559768
Moustafa Mahmoud, Mohammad Mannan, A. Youssef
We propose APTHunter, a system for prompt detection of Advanced and Persistent Threats (APTs) in early stages. We provide an approach for representing the indicators of compromise that appear in the cyber threat intelligence reports and the relationships among them as provenance queries that capture the attacker’s malicious behavior. We use the kernel audit log as a reliable source for system activities and develop an optimized whole system provenance graph that provides the causal relationships and information flows among system entities in a compact format. Then, we model the threat hunting as a behavior match problem by applying provenance queries to the optimized provenance graph to find any hits as indicators of an APT attack. We evaluate APTHunter on adversarial engagements from DARPA over different OS platforms, as well as real-world APT campaigns. Based on our experimental results, APTHunter promptly and reliably detects attack artifacts in early stages.
我们提出APTHunter,一个在早期阶段迅速检测高级和持续威胁(apt)的系统。我们提供了一种方法来表示出现在网络威胁情报报告中的妥协指标,以及它们之间的关系,作为捕获攻击者恶意行为的来源查询。我们使用内核审计日志作为系统活动的可靠来源,并开发了一个优化的整个系统来源图,该图以紧凑的格式提供了系统实体之间的因果关系和信息流。然后,我们将威胁搜索建模为行为匹配问题,通过对优化的来源图应用来源查询来查找任何命中作为APT攻击的指标。我们评估了APTHunter在DARPA不同操作系统平台上的对抗性交战,以及现实世界的APT活动。根据我们的实验结果,APTHunter在早期阶段迅速可靠地检测到攻击工件。
{"title":"APTHunter: Detecting Advanced Persistent Threats in Early Stages","authors":"Moustafa Mahmoud, Mohammad Mannan, A. Youssef","doi":"10.1145/3559768","DOIUrl":"https://doi.org/10.1145/3559768","url":null,"abstract":"We propose APTHunter, a system for prompt detection of Advanced and Persistent Threats (APTs) in early stages. We provide an approach for representing the indicators of compromise that appear in the cyber threat intelligence reports and the relationships among them as provenance queries that capture the attacker’s malicious behavior. We use the kernel audit log as a reliable source for system activities and develop an optimized whole system provenance graph that provides the causal relationships and information flows among system entities in a compact format. Then, we model the threat hunting as a behavior match problem by applying provenance queries to the optimized provenance graph to find any hits as indicators of an APT attack. We evaluate APTHunter on adversarial engagements from DARPA over different OS platforms, as well as real-world APT campaigns. Based on our experimental results, APTHunter promptly and reliably detects attack artifacts in early stages.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"58 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120943064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Evolving Menace of Ransomware: A Comparative Analysis of Pre-pandemic and Mid-pandemic Attacks 勒索软件不断演变的威胁:流行病前和流行病中期攻击的比较分析
Pub Date : 2022-08-23 DOI: 10.1145/3558006
Michael Lang, L. Connolly, Paul Taylor, Phillip J. Corner
Drawing upon direct interviews and secondary sources, this paper presents a qualitative comparative analysis of thirty-nine ransomware attacks, twenty-six of which occurred shortly before the outbreak of the COVID-19 pandemic and thirteen of which took place during the pandemic. The research objective was to gain an understanding of how ransomware attacks changed tactics across this period. Using inductive content analysis, a number of key themes emerged, namely: (1) ransomware attackers have adopted more sinister tactics and now commit multiple crimes to maximise their return, (2) the expanded attack surface caused by employees working from home has greatly aggravated the risk of malicious intrusion, (3) the preferred attack vectors have changed, with phishing and VPN exploits now to the fore, (4) failure to adapt common business processes from off-line to on-line interaction has created vulnerabilities, (5) the ongoing laissez-faire attitude towards cybersecurity and lack of preparedness continues to be a substantial problem, and (6) ransomware attacks now pose potentially severe consequences for individuals, whose personal data has become a central part of the game. Recommendations are proposed to address these issues.
根据直接访谈和二手资料,本文对39起勒索软件攻击进行了定性比较分析,其中26起发生在COVID-19大流行爆发前不久,13起发生在大流行期间。研究的目的是了解勒索软件攻击在这一时期是如何改变策略的。采用归纳式内容分析,出现了一些关键主题,即:(1)勒索软件攻击者采取了更险恶的策略,现在实施多种犯罪以最大化其回报;(2)员工在家工作导致攻击面扩大,大大加剧了恶意入侵的风险;(3)首选攻击媒介发生了变化,网络钓鱼和VPN漏洞现在脱颖而出;(4)未能将常见的业务流程从离线调整为在线交互,从而产生了漏洞。(5)对网络安全的放任态度和缺乏准备仍然是一个重大问题;(6)勒索软件攻击现在对个人构成潜在的严重后果,个人数据已成为游戏的核心部分。提出了解决这些问题的建议。
{"title":"The Evolving Menace of Ransomware: A Comparative Analysis of Pre-pandemic and Mid-pandemic Attacks","authors":"Michael Lang, L. Connolly, Paul Taylor, Phillip J. Corner","doi":"10.1145/3558006","DOIUrl":"https://doi.org/10.1145/3558006","url":null,"abstract":"Drawing upon direct interviews and secondary sources, this paper presents a qualitative comparative analysis of thirty-nine ransomware attacks, twenty-six of which occurred shortly before the outbreak of the COVID-19 pandemic and thirteen of which took place during the pandemic. The research objective was to gain an understanding of how ransomware attacks changed tactics across this period. Using inductive content analysis, a number of key themes emerged, namely: (1) ransomware attackers have adopted more sinister tactics and now commit multiple crimes to maximise their return, (2) the expanded attack surface caused by employees working from home has greatly aggravated the risk of malicious intrusion, (3) the preferred attack vectors have changed, with phishing and VPN exploits now to the fore, (4) failure to adapt common business processes from off-line to on-line interaction has created vulnerabilities, (5) the ongoing laissez-faire attitude towards cybersecurity and lack of preparedness continues to be a substantial problem, and (6) ransomware attacks now pose potentially severe consequences for individuals, whose personal data has become a central part of the game. Recommendations are proposed to address these issues.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121924296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CDNs’ Dark Side: Security Problems in CDN-to-Origin Connections cdn的黑暗面:cdn到原点连接的安全问题
Pub Date : 2022-07-19 DOI: 10.1145/3499428
Behnam Shobiri, Mohammad Mannan, A. Youssef
Content Delivery Networks (CDNs) play a vital role in today’s Internet ecosystem. To reduce the latency of loading a website’s content, CDNs deploy edge servers in different geographic locations. CDN providers also offer important security features including protection against Denial of Service (DoS) attacks, Web Application Firewalls (WAFs), and recently, issuing and managing certificates for their customers. Many popular websites use CDNs to benefit from both the security and the performance advantages. For HTTPS websites, Transport Layer Security (TLS) security choices may differ in the connections between end-users and a CDN (front-end or user-to-CDN), and between the CDN and the origin server (back-end or CDN-to-Origin). Modern browsers can stop/warn users if weak or insecure TLS/HTTPS options are used in the front-end connections. However, such problems in the back-end connections are not visible to browsers or end-users, and lead to serious security issues (e.g., not validating the certificate can lead to MitM attacks). In this article, we primarily analyze TLS/HTTPS security issues in the back-end communication; such issues include inadequate certificate validation and support for vulnerable TLS configurations. We develop a test framework and investigate the back-end connection of 14 leading CDNs (including Cloudflare, Microsoft Azure, Amazon, and Fastly), where we could create an account. Surprisingly, for all the 14 CDNs, we found that the back-end TLS connections are vulnerable to security issues prevented/warned by modern browsers; examples include failing to validate the origin server’s certificate, and using insecure cipher suites such as RC4, MD5, SHA-1, and even allowing plain HTTP connections to the origin. We also identified 168,795 websites in the Alexa top 1 million that are potentially vulnerable to Man-in-the-Middle (MitM) attacks in their back-end connections regardless of the origin/CDN configurations chosen by the origin owner.
内容分发网络(cdn)在当今的互联网生态系统中扮演着至关重要的角色。为了减少加载网站内容的延迟,cdn在不同的地理位置部署边缘服务器。CDN提供商还提供重要的安全功能,包括防止拒绝服务(DoS)攻击、Web应用防火墙(waf),以及最近为客户颁发和管理证书。许多流行的网站使用cdn从安全性和性能优势中获益。对于HTTPS网站,在最终用户和CDN(前端或用户到CDN)之间以及CDN和源服务器(后端或CDN到源)之间的连接中,传输层安全(TLS)安全选择可能会有所不同。如果在前端连接中使用弱或不安全的TLS/HTTPS选项,现代浏览器可以停止/警告用户。但是,后端连接中的此类问题对于浏览器或最终用户来说是不可见的,并且会导致严重的安全问题(例如,不验证证书可能导致MitM攻击)。在本文中,我们主要分析了TLS/HTTPS在后端通信中的安全问题;这些问题包括证书验证不足和对易受攻击的TLS配置的支持。我们开发了一个测试框架,并调查了14个领先的cdn(包括Cloudflare、Microsoft Azure、Amazon和Fastly)的后端连接,我们可以在其中创建一个帐户。令人惊讶的是,对于所有14个cdn,我们发现后端TLS连接容易受到现代浏览器阻止/警告的安全问题的攻击;示例包括无法验证源服务器的证书,使用不安全的密码套件(如RC4、MD5、SHA-1),甚至允许纯HTTP连接到源服务器。我们还确定了Alexa前100万个网站中有168,795个网站在后端连接中可能容易受到中间人(MitM)攻击,无论原始所有者选择的原始/CDN配置如何。
{"title":"CDNs’ Dark Side: Security Problems in CDN-to-Origin Connections","authors":"Behnam Shobiri, Mohammad Mannan, A. Youssef","doi":"10.1145/3499428","DOIUrl":"https://doi.org/10.1145/3499428","url":null,"abstract":"Content Delivery Networks (CDNs) play a vital role in today’s Internet ecosystem. To reduce the latency of loading a website’s content, CDNs deploy edge servers in different geographic locations. CDN providers also offer important security features including protection against Denial of Service (DoS) attacks, Web Application Firewalls (WAFs), and recently, issuing and managing certificates for their customers. Many popular websites use CDNs to benefit from both the security and the performance advantages. For HTTPS websites, Transport Layer Security (TLS) security choices may differ in the connections between end-users and a CDN (front-end or user-to-CDN), and between the CDN and the origin server (back-end or CDN-to-Origin). Modern browsers can stop/warn users if weak or insecure TLS/HTTPS options are used in the front-end connections. However, such problems in the back-end connections are not visible to browsers or end-users, and lead to serious security issues (e.g., not validating the certificate can lead to MitM attacks). In this article, we primarily analyze TLS/HTTPS security issues in the back-end communication; such issues include inadequate certificate validation and support for vulnerable TLS configurations. We develop a test framework and investigate the back-end connection of 14 leading CDNs (including Cloudflare, Microsoft Azure, Amazon, and Fastly), where we could create an account. Surprisingly, for all the 14 CDNs, we found that the back-end TLS connections are vulnerable to security issues prevented/warned by modern browsers; examples include failing to validate the origin server’s certificate, and using insecure cipher suites such as RC4, MD5, SHA-1, and even allowing plain HTTP connections to the origin. We also identified 168,795 websites in the Alexa top 1 million that are potentially vulnerable to Man-in-the-Middle (MitM) attacks in their back-end connections regardless of the origin/CDN configurations chosen by the origin owner.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134265829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Toward Improving the Security of IoT and CPS Devices: An AI Approach 提高物联网和CPS设备的安全性:一种人工智能方法
Pub Date : 2022-07-08 DOI: 10.1145/3497862
Abdurhman Albasir, Kshirasagar Naik, Ricardo Manzano
Detecting anomalously behaving devices in security-and-safety-critical applications is an important challenge. This article presents an off-device methodology for detecting the anomalous behavior of devices considering their power consumption data. The methodology takes advantage of the fact that every action on-board a device will be reflected in its power trace. This argument makes it inevitable for anomalously behaving device to go undetected. We transform the device’s one-dimensional (1D) instantaneous power consumption signals to 2D time–frequency images using Constant Q Transformation (CQT). The CQT images capture valuable information about the tasks performed on-board a device. By applying Histograms of Oriented Gradients (HOG) on the CQT images, we extract robust features that preserve the edges of time–frequency structures and capture the directionality of the edge information. Consequently, we transform the anomaly detection problem into an image classification problem. We train a Convolutional Neural Network on the HOG images to classify the power signals to detect anomaly. We validated the methodology using a wide spectrum of emulated malware scenarios, five real malware applications from the well-known Drebin dataset, Distributed Denial of Service attacks, cryptomining malware, and faulty CPU cores. Across 18 datasets, our methodology demonstrated detection performance of ∼88% accuracy and 85% F-Score, resulting in improvements of 9–17% over other methods using power signals.
在安全和安全关键应用中检测异常行为设备是一个重要的挑战。本文提出了一种设备外方法,用于检测考虑其功耗数据的设备的异常行为。该方法利用了这样一个事实,即设备上的每个动作都将反映在其功率轨迹中。这个论点使得异常行为的设备不可避免地不被发现。我们使用恒Q变换(CQT)将器件的一维(1D)瞬时功耗信号转换为二维时频图像。CQT图像捕获有关设备上执行的任务的有价值的信息。通过在CQT图像上应用定向梯度直方图(HOG),我们提取了保留时频结构边缘的鲁棒特征,并捕获了边缘信息的方向性。因此,我们将异常检测问题转化为图像分类问题。我们在HOG图像上训练卷积神经网络对功率信号进行分类以检测异常。我们使用广泛的模拟恶意软件场景,来自著名的Drebin数据集的五个真实恶意软件应用程序,分布式拒绝服务攻击,加密恶意软件和故障CPU内核验证了该方法。在18个数据集中,我们的方法证明了检测精度为~ 88%和F-Score为85%的性能,比使用功率信号的其他方法提高了9-17%。
{"title":"Toward Improving the Security of IoT and CPS Devices: An AI Approach","authors":"Abdurhman Albasir, Kshirasagar Naik, Ricardo Manzano","doi":"10.1145/3497862","DOIUrl":"https://doi.org/10.1145/3497862","url":null,"abstract":"Detecting anomalously behaving devices in security-and-safety-critical applications is an important challenge. This article presents an off-device methodology for detecting the anomalous behavior of devices considering their power consumption data. The methodology takes advantage of the fact that every action on-board a device will be reflected in its power trace. This argument makes it inevitable for anomalously behaving device to go undetected. We transform the device’s one-dimensional (1D) instantaneous power consumption signals to 2D time–frequency images using Constant Q Transformation (CQT). The CQT images capture valuable information about the tasks performed on-board a device. By applying Histograms of Oriented Gradients (HOG) on the CQT images, we extract robust features that preserve the edges of time–frequency structures and capture the directionality of the edge information. Consequently, we transform the anomaly detection problem into an image classification problem. We train a Convolutional Neural Network on the HOG images to classify the power signals to detect anomaly. We validated the methodology using a wide spectrum of emulated malware scenarios, five real malware applications from the well-known Drebin dataset, Distributed Denial of Service attacks, cryptomining malware, and faulty CPU cores. Across 18 datasets, our methodology demonstrated detection performance of ∼88% accuracy and 85% F-Score, resulting in improvements of 9–17% over other methods using power signals.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130886164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Role of Machine Learning in Cybersecurity 机器学习在网络安全中的作用
Pub Date : 2022-06-20 DOI: 10.1145/3545574
Giovanni Apruzzese, P. Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Brdalo Rapa, A. Grammatopoulos, Fabio Di Franco
Machine Learning (ML) represents a pivotal technology for current and future information systems, and many domains already leverage the capabilities of ML. However, deployment of ML in cybersecurity is still at an early stage, revealing a significant discrepancy between research and practice. Such a discrepancy has its root cause in the current state of the art, which does not allow us to identify the role of ML in cybersecurity. The full potential of ML will never be unleashed unless its pros and cons are understood by a broad audience. This article is the first attempt to provide a holistic understanding of the role of ML in the entire cybersecurity domain—to any potential reader with an interest in this topic. We highlight the advantages of ML with respect to human-driven detection methods, as well as the additional tasks that can be addressed by ML in cybersecurity. Moreover, we elucidate various intrinsic problems affecting real ML deployments in cybersecurity. Finally, we present how various stakeholders can contribute to future developments of ML in cybersecurity, which is essential for further progress in this field. Our contributions are complemented with two real case studies describing industrial applications of ML as defense against cyber-threats.
机器学习(ML)是当前和未来信息系统的关键技术,许多领域已经利用了ML的功能。然而,ML在网络安全中的部署仍处于早期阶段,这表明研究与实践之间存在重大差异。这种差异的根本原因在于目前的技术状况,这使我们无法确定机器学习在网络安全中的作用。机器学习的全部潜力永远不会被释放,除非它的优点和缺点被广泛的受众所理解。本文是第一次尝试全面理解机器学习在整个网络安全领域中的作用——对于任何对这个主题感兴趣的潜在读者。我们强调了机器学习相对于人类驱动的检测方法的优势,以及机器学习在网络安全中可以解决的额外任务。此外,我们阐明了影响网络安全中真实ML部署的各种内在问题。最后,我们介绍了各种利益相关者如何为网络安全中的机器学习的未来发展做出贡献,这对于该领域的进一步发展至关重要。我们的贡献与两个真实案例研究相辅相成,这些案例研究描述了机器学习作为防御网络威胁的工业应用。
{"title":"The Role of Machine Learning in Cybersecurity","authors":"Giovanni Apruzzese, P. Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Brdalo Rapa, A. Grammatopoulos, Fabio Di Franco","doi":"10.1145/3545574","DOIUrl":"https://doi.org/10.1145/3545574","url":null,"abstract":"Machine Learning (ML) represents a pivotal technology for current and future information systems, and many domains already leverage the capabilities of ML. However, deployment of ML in cybersecurity is still at an early stage, revealing a significant discrepancy between research and practice. Such a discrepancy has its root cause in the current state of the art, which does not allow us to identify the role of ML in cybersecurity. The full potential of ML will never be unleashed unless its pros and cons are understood by a broad audience. This article is the first attempt to provide a holistic understanding of the role of ML in the entire cybersecurity domain—to any potential reader with an interest in this topic. We highlight the advantages of ML with respect to human-driven detection methods, as well as the additional tasks that can be addressed by ML in cybersecurity. Moreover, we elucidate various intrinsic problems affecting real ML deployments in cybersecurity. Finally, we present how various stakeholders can contribute to future developments of ML in cybersecurity, which is essential for further progress in this field. Our contributions are complemented with two real case studies describing industrial applications of ML as defense against cyber-threats.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131192921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Field Note on IoT Security: Novel JIT Security for Large-Scale Heterogeneous IoT Deployments 物联网安全现场笔记:大规模异构物联网部署的新型JIT安全
Pub Date : 2022-05-06 DOI: 10.1145/3503919
Karl Mozurkewich
This article provides an overview of specific security considerations for multi-modal Internet-of-Things(IoT) use-case deployment. With the year-over-year exponential increase in smartdevice deployments, threat vectors continue to fall into a concise list of categories, all of which can be addressed with classic solution architectures. To provide increased business value from technology deployments, we look at applying novel additions to common deployment architectures to achieve high return-on-investment (ROI) on our deployments, while managing the security risk associated with heterogeneous device deployments.
本文概述了多模态物联网(IoT)用例部署的特定安全注意事项。随着智能设备部署的逐年指数级增长,威胁向量继续归为简明的类别列表,所有这些都可以通过经典的解决方案架构来解决。为了从技术部署中提供更多的业务价值,我们考虑将新的附加功能应用到常见的部署体系结构中,以实现部署的高投资回报率(ROI),同时管理与异构设备部署相关的安全风险。
{"title":"Field Note on IoT Security: Novel JIT Security for Large-Scale Heterogeneous IoT Deployments","authors":"Karl Mozurkewich","doi":"10.1145/3503919","DOIUrl":"https://doi.org/10.1145/3503919","url":null,"abstract":"This article provides an overview of specific security considerations for multi-modal Internet-of-Things(IoT) use-case deployment. With the year-over-year exponential increase in smartdevice deployments, threat vectors continue to fall into a concise list of categories, all of which can be addressed with classic solution architectures. To provide increased business value from technology deployments, we look at applying novel additions to common deployment architectures to achieve high return-on-investment (ROI) on our deployments, while managing the security risk associated with heterogeneous device deployments.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134011916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fight Hardware with Hardware: Systemwide Detection and Mitigation of Side-channel Attacks Using Performance Counters 以硬件对抗硬件:使用性能计数器的系统范围检测和缓解侧信道攻击
Pub Date : 2022-04-30 DOI: 10.1145/3519601
Stefano Carnà, Serena Ferracci, F. Quaglia, Alessandro Pellegrini
We present a kernel-level infrastructure that allows systemwide detection of malicious applications attempting to exploit cache-based side-channel attacks to break the process confinement enforced by standard operating systems. This infrastructure relies on hardware performance counters to collect information at runtime from all applications running on the machine. High-level detection metrics are derived from these measurements to maximize the likelihood of promptly detecting a malicious application. Our experimental assessment shows that we can catch a large family of side-channel attacks with a significantly reduced overhead. We also discuss countermeasures that can be enacted once a process is suspected of carrying out a side-channel attack to increase the overall tradeoff between the system’s security level and the delivered performance under non-suspected process executions.
我们提出了一个内核级基础设施,它允许系统范围内检测恶意应用程序,这些应用程序试图利用基于缓存的侧通道攻击来打破标准操作系统强制的进程限制。此基础结构依赖硬件性能计数器在运行时从计算机上运行的所有应用程序收集信息。高级检测指标是从这些度量中派生出来的,以最大限度地提高迅速检测到恶意应用程序的可能性。我们的实验评估表明,我们可以在显著降低开销的情况下捕获大量的侧信道攻击。我们还讨论了一旦怀疑流程执行了侧通道攻击,可以制定的对策,以增加系统安全级别与在非怀疑流程执行下交付的性能之间的总体权衡。
{"title":"Fight Hardware with Hardware: Systemwide Detection and Mitigation of Side-channel Attacks Using Performance Counters","authors":"Stefano Carnà, Serena Ferracci, F. Quaglia, Alessandro Pellegrini","doi":"10.1145/3519601","DOIUrl":"https://doi.org/10.1145/3519601","url":null,"abstract":"We present a kernel-level infrastructure that allows systemwide detection of malicious applications attempting to exploit cache-based side-channel attacks to break the process confinement enforced by standard operating systems. This infrastructure relies on hardware performance counters to collect information at runtime from all applications running on the machine. High-level detection metrics are derived from these measurements to maximize the likelihood of promptly detecting a malicious application. Our experimental assessment shows that we can catch a large family of side-channel attacks with a significantly reduced overhead. We also discuss countermeasures that can be enacted once a process is suspected of carrying out a side-channel attack to increase the overall tradeoff between the system’s security level and the delivered performance under non-suspected process executions.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128589481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
General-purpose Unsupervised Cyber Anomaly Detection via Non-negative Tensor Factorization 基于非负张量分解的通用无监督网络异常检测
Pub Date : 2022-04-12 DOI: 10.1145/3519602
M. Eren, Juston S. Moore, E. Skau, Elisabeth Moore, Manish Bhattarai, Gopinath Chennupati, B. Alexandrov
Distinguishing malicious anomalous activities from unusual but benign activities is a fundamental challenge for cyber defenders. Prior studies have shown that statistical user behavior analysis yields accurate detections by learning behavior profiles from observed user activity. These unsupervised models are able to generalize to unseen types of attacks by detecting deviations from normal behavior without knowledge of specific attack signatures. However, approaches proposed to date based on probabilistic matrix factorization are limited by the information conveyed in a two-dimensional space. Non-negative tensor factorization, however, is a powerful unsupervised machine learning method that naturally models multi-dimensional data, capturing complex and multi-faceted details of behavior profiles. Our new unsupervised statistical anomaly detection methodology matches or surpasses state-of-the-art supervised learning baselines across several challenging and diverse cyber application areas, including detection of compromised user credentials, botnets, spam e-mails, and fraudulent credit card transactions.
区分恶意异常活动与异常但良性的活动是网络防御者面临的基本挑战。先前的研究表明,统计用户行为分析通过从观察到的用户活动中学习行为概况来产生准确的检测。这些无监督模型能够通过检测与正常行为的偏差来推广到不可见的攻击类型,而无需了解特定的攻击特征。然而,迄今提出的基于概率矩阵分解的方法受限于在二维空间中传递的信息。然而,非负张量分解是一种强大的无监督机器学习方法,可以自然地对多维数据进行建模,捕获行为概况的复杂和多方面细节。我们新的无监督统计异常检测方法在几个具有挑战性和多样化的网络应用领域,包括检测受损用户凭据、僵尸网络、垃圾邮件和欺诈性信用卡交易,匹配或超过了最先进的监督学习基线。
{"title":"General-purpose Unsupervised Cyber Anomaly Detection via Non-negative Tensor Factorization","authors":"M. Eren, Juston S. Moore, E. Skau, Elisabeth Moore, Manish Bhattarai, Gopinath Chennupati, B. Alexandrov","doi":"10.1145/3519602","DOIUrl":"https://doi.org/10.1145/3519602","url":null,"abstract":"Distinguishing malicious anomalous activities from unusual but benign activities is a fundamental challenge for cyber defenders. Prior studies have shown that statistical user behavior analysis yields accurate detections by learning behavior profiles from observed user activity. These unsupervised models are able to generalize to unseen types of attacks by detecting deviations from normal behavior without knowledge of specific attack signatures. However, approaches proposed to date based on probabilistic matrix factorization are limited by the information conveyed in a two-dimensional space. Non-negative tensor factorization, however, is a powerful unsupervised machine learning method that naturally models multi-dimensional data, capturing complex and multi-faceted details of behavior profiles. Our new unsupervised statistical anomaly detection methodology matches or surpasses state-of-the-art supervised learning baselines across several challenging and diverse cyber application areas, including detection of compromised user credentials, botnets, spam e-mails, and fraudulent credit card transactions.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"63 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128737511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Digital Threats: Research and Practice
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1