首页 > 最新文献

European Conference on Cyber Warfare and Security最新文献

英文 中文
Towards the Development of Indicators of Fake Websites for Digital Investigation 数字调查中虚假网站指标的发展
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1176
Aysha Alkuwaiti, Mera Alremeithi, Haya Alobeidli, R. Ikuesan
A fake website is considered a website that is intended to cause harm and manipulate users, especially novice users without some knowledge of indicators of fakeness. Understanding the indicators of fake websites is thus considered an important concept to avoid being a victim of malicious attacks in online engagements. In some cases, such knowledge is required to reduce the potential attack surface of cyber criminals. However, the increasing rate of website diversity and complexities makes it difficult for an individual to distinguish between a fake and a real website while compounding the investigation process of a website. Also, the growing rate of website imitation technology and website domain closure presents a veritable platform for the development of fake websites. As a step towards determining the genuineness of a website, this study developed a forensic framework based on an exploratory analysis of different genres of fake websites. To achieve this, forensic methodologies and processes were applied to methodically selected samples of known fake websites based on three fakeness categories: Hoaxes, Cybersquatting, and Sweepstakes. The result revealed the existence of salient markers which can be used as indicators of fakeness and can be applied across a wide genre of websites.  Furthermore, the resultant observation was used to develop a digital forensic framework for website fakeness evaluation. The developed framework was benchmarked to the ISO 27043/2015 and the NIST SP800-86 standard for completeness and relevance to forensic investigation processes. By leveraging the proposed digital forensic framework, an investigation can develop a reliable pointer to evaluate the genuineness of any website, which can significantly reduce the investigation time. For a non-forensic individual, the developed framework can be leveraged to identify, at first glance, the degree of fakeness of a website. Such a mechanism can therefore provide a useful tool to reduce the potential susceptibility of users thereby creating user awareness.
假冒网站被认为是一个旨在造成伤害和操纵用户的网站,特别是新手用户,没有一些虚假指标的知识。因此,了解虚假网站的指标被认为是一个重要的概念,以避免在网络活动中成为恶意攻击的受害者。在某些情况下,需要这些知识来减少网络罪犯的潜在攻击面。然而,随着网站多样性和复杂性的增加,个人很难区分真假网站,同时也增加了对网站的调查过程。此外,越来越多的网站模仿技术和网站域名关闭为假冒网站的发展提供了一个真正的平台。作为确定网站真伪的一步,本研究在对不同类型的虚假网站进行探索性分析的基础上,开发了一个法医框架。为了实现这一目标,我们将法医学方法和流程应用于基于三种虚假类别(Hoaxes, Cybersquatting和Sweepstakes)有条不紊地选择已知虚假网站的样本。结果揭示了显著标记的存在,这些标记可以用作虚假指标,并可以应用于广泛类型的网站。此外,由此产生的观察结果被用于开发网站虚假评估的数字取证框架。开发的框架以ISO 27043/2015和NIST SP800-86标准为基准,以确保完整性和与法医调查过程的相关性。通过利用所提出的数字取证框架,调查可以开发一个可靠的指针来评估任何网站的真实性,这可以大大减少调查时间。对于非法医个人,开发的框架可以用来识别,第一眼,一个网站的虚假程度。因此,这种机制可以提供一种有用的工具,以减少用户的潜在易感性,从而提高用户的意识。
{"title":"Towards the Development of Indicators of Fake Websites for Digital Investigation","authors":"Aysha Alkuwaiti, Mera Alremeithi, Haya Alobeidli, R. Ikuesan","doi":"10.34190/eccws.22.1.1176","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1176","url":null,"abstract":"A fake website is considered a website that is intended to cause harm and manipulate users, especially novice users without some knowledge of indicators of fakeness. Understanding the indicators of fake websites is thus considered an important concept to avoid being a victim of malicious attacks in online engagements. In some cases, such knowledge is required to reduce the potential attack surface of cyber criminals. However, the increasing rate of website diversity and complexities makes it difficult for an individual to distinguish between a fake and a real website while compounding the investigation process of a website. Also, the growing rate of website imitation technology and website domain closure presents a veritable platform for the development of fake websites. As a step towards determining the genuineness of a website, this study developed a forensic framework based on an exploratory analysis of different genres of fake websites. To achieve this, forensic methodologies and processes were applied to methodically selected samples of known fake websites based on three fakeness categories: Hoaxes, Cybersquatting, and Sweepstakes. The result revealed the existence of salient markers which can be used as indicators of fakeness and can be applied across a wide genre of websites.  Furthermore, the resultant observation was used to develop a digital forensic framework for website fakeness evaluation. The developed framework was benchmarked to the ISO 27043/2015 and the NIST SP800-86 standard for completeness and relevance to forensic investigation processes. By leveraging the proposed digital forensic framework, an investigation can develop a reliable pointer to evaluate the genuineness of any website, which can significantly reduce the investigation time. For a non-forensic individual, the developed framework can be leveraged to identify, at first glance, the degree of fakeness of a website. Such a mechanism can therefore provide a useful tool to reduce the potential susceptibility of users thereby creating user awareness.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126529252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Functional Architectural Design of a Digital Forensic Readiness Cybercrime Language as a Service 数字取证准备网络犯罪语言服务的功能架构设计
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1240
Stacey O Baror, Richard Adeyemi, I, H. Venter
Developing a generic digital forensic solution in a cloud computing platform that can address the functional requirements of digital forensic stakeholders is a complex process. The solution would require a technology-independent architectural design that addresses the challenges of incident threat identification, triggering, incident threat isolation and investigation. Existing approaches are limited to the functionality that treats these four challenges individually without the due diligence to consider their interoperability. This study proposes a context-independent and technology-neutral architecture to address these issues by developing a digital forensic readiness (DFR) based on a human language communication interaction (HLI) system that could create a cybercrime language as a service (DFClaaS). The functional architectural design of the proposed DFR HLI DFClaaS system comprises microservices, layered and event/component-based architectural patterns on top of cloud architectural patterns. The DFR HLI DFClaaS system integrates flexibility and other quality requirements to separate concerns while accommodating rigid requirements like security and reliability. The developed architecture is essential for any human-centred digital forensic solution. Therefore, integrating the developed architecture presents a reliable baseline for the digital forensic community. 
在云计算平台中开发通用数字取证解决方案以满足数字取证利益相关者的功能需求是一个复杂的过程。该解决方案需要独立于技术的体系结构设计,以应对事件威胁识别、触发、事件威胁隔离和调查等挑战。现有的方法仅限于单独处理这四个挑战的功能,而没有认真考虑它们的互操作性。本研究提出了一种独立于上下文和技术中立的架构,通过开发基于人类语言交流交互(HLI)系统的数字取证准备(DFR)来解决这些问题,该系统可以创建网络犯罪语言即服务(DFClaaS)。提出的DFR HLI DFClaaS系统的功能体系结构设计包括云体系结构模式之上的微服务、分层和基于事件/组件的体系结构模式。DFR HLI DFClaaS系统集成了灵活性和其他质量要求,以分离关注点,同时适应安全性和可靠性等严格要求。开发的架构对于任何以人为中心的数字取证解决方案都是必不可少的。因此,集成已开发的体系结构为数字取证社区提供了可靠的基线。
{"title":"Functional Architectural Design of a Digital Forensic Readiness Cybercrime Language as a Service","authors":"Stacey O Baror, Richard Adeyemi, I, H. Venter","doi":"10.34190/eccws.22.1.1240","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1240","url":null,"abstract":"Developing a generic digital forensic solution in a cloud computing platform that can address the functional requirements of digital forensic stakeholders is a complex process. The solution would require a technology-independent architectural design that addresses the challenges of incident threat identification, triggering, incident threat isolation and investigation. Existing approaches are limited to the functionality that treats these four challenges individually without the due diligence to consider their interoperability. This study proposes a context-independent and technology-neutral architecture to address these issues by developing a digital forensic readiness (DFR) based on a human language communication interaction (HLI) system that could create a cybercrime language as a service (DFClaaS). The functional architectural design of the proposed DFR HLI DFClaaS system comprises microservices, layered and event/component-based architectural patterns on top of cloud architectural patterns. The DFR HLI DFClaaS system integrates flexibility and other quality requirements to separate concerns while accommodating rigid requirements like security and reliability. The developed architecture is essential for any human-centred digital forensic solution. Therefore, integrating the developed architecture presents a reliable baseline for the digital forensic community. ","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121735551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attention-Based Deep Learning Modelling for Intrusion Detection 基于注意力的入侵检测深度学习模型
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1172
Ban AlOmar, Z. Trabelsi, Firas Saidi
Cyber-attacks are becoming increasingly sophisticated, posing more significant challenges to traditional intrusion detection methods. The inability to prevent intrusions could compromise the credibility of security services, thereby putting data confidentiality, integrity, and availability at risk. In response to this problem, research has been conducted to apply deep learning (DL) models to intrusion detection, leveraging the new era of AI and the proven efficiency of DL in many fields. This study proposes a new intrusion detection system (IDS) based on DL, utilizing attention-based long short-term memory (AT-LSTM) and attention-based bidirectional LSTM (AT-BiLSTM) models. The time-series nature of network traffic data, which changes continuously over time, makes LSTM and BiLSTM particularly effective in handling intrusion detection. These models can capture long-term dependencies in the sequence of events, learn the patterns of normal network behaviour, and detect deviations from this behaviour that may indicate an intrusion. Also, the attention mechanism in the proposed models lets them make predictions based on the most important parts of the network traffic data. This is important for finding intrusions because network traffic data can have many different features, not all of which are important for finding an attack. The attention mechanism lets the models learn which features are most important for making accurate predictions, which improves their performance and efficiency. The UNSW-NB15 benchmark dataset is used in the study to measure and compare the effectiveness and reliability of the proposed system. This dataset contains normal and attack traffic data with a significant class imbalance. To address this issue, the study employs the Synthetic Minority Over-sampling Technique (SMOTE) to balance the dataset, thus reducing the risk of overfitting to the majority class and improving the model's performance in detecting attacks. The performance evaluation results demonstrate that the proposed models achieved a detection rate of over 93%, indicating high precision in detecting intrusions. By harnessing the power of deep learning, these models can learn and adapt to new threats over time, thus ensuring data confidentiality, integrity, and availability in today's interconnected world.
网络攻击越来越复杂,对传统的入侵检测方法提出了更大的挑战。无法防止入侵可能会损害安全服务的可信度,从而使数据机密性、完整性和可用性面临风险。针对这一问题,人们开展了将深度学习(DL)模型应用于入侵检测的研究,利用人工智能的新时代和深度学习在许多领域被证明的效率。本文利用基于注意的长短期记忆(AT-LSTM)和基于注意的双向LSTM (AT-BiLSTM)模型,提出了一种基于深度学习的入侵检测系统(IDS)。网络流量数据随时间不断变化的时间序列特性,使得LSTM和BiLSTM在处理入侵检测方面特别有效。这些模型可以捕获事件序列中的长期依赖关系,学习正常网络行为的模式,并检测可能表明入侵的这种行为的偏差。此外,所提出的模型中的注意机制使它们能够根据网络流量数据的最重要部分做出预测。这对于发现入侵很重要,因为网络流量数据可能具有许多不同的特征,但并非所有特征对于发现攻击都很重要。注意机制让模型了解哪些特征对于做出准确的预测是最重要的,这提高了它们的性能和效率。研究中使用UNSW-NB15基准数据集来测量和比较所提出系统的有效性和可靠性。该数据集包含正常流量和攻击流量数据,且类不平衡明显。为了解决这个问题,该研究采用了合成少数派过采样技术(SMOTE)来平衡数据集,从而降低了过度拟合到多数类的风险,提高了模型在检测攻击方面的性能。性能评价结果表明,该模型的检测率达到93%以上,具有较高的检测精度。通过利用深度学习的力量,这些模型可以随着时间的推移学习和适应新的威胁,从而在当今相互关联的世界中确保数据的机密性、完整性和可用性。
{"title":"Attention-Based Deep Learning Modelling for Intrusion Detection","authors":"Ban AlOmar, Z. Trabelsi, Firas Saidi","doi":"10.34190/eccws.22.1.1172","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1172","url":null,"abstract":"Cyber-attacks are becoming increasingly sophisticated, posing more significant challenges to traditional intrusion detection methods. The inability to prevent intrusions could compromise the credibility of security services, thereby putting data confidentiality, integrity, and availability at risk. In response to this problem, research has been conducted to apply deep learning (DL) models to intrusion detection, leveraging the new era of AI and the proven efficiency of DL in many fields. This study proposes a new intrusion detection system (IDS) based on DL, utilizing attention-based long short-term memory (AT-LSTM) and attention-based bidirectional LSTM (AT-BiLSTM) models. The time-series nature of network traffic data, which changes continuously over time, makes LSTM and BiLSTM particularly effective in handling intrusion detection. These models can capture long-term dependencies in the sequence of events, learn the patterns of normal network behaviour, and detect deviations from this behaviour that may indicate an intrusion. Also, the attention mechanism in the proposed models lets them make predictions based on the most important parts of the network traffic data. This is important for finding intrusions because network traffic data can have many different features, not all of which are important for finding an attack. The attention mechanism lets the models learn which features are most important for making accurate predictions, which improves their performance and efficiency. The UNSW-NB15 benchmark dataset is used in the study to measure and compare the effectiveness and reliability of the proposed system. This dataset contains normal and attack traffic data with a significant class imbalance. To address this issue, the study employs the Synthetic Minority Over-sampling Technique (SMOTE) to balance the dataset, thus reducing the risk of overfitting to the majority class and improving the model's performance in detecting attacks. The performance evaluation results demonstrate that the proposed models achieved a detection rate of over 93%, indicating high precision in detecting intrusions. By harnessing the power of deep learning, these models can learn and adapt to new threats over time, thus ensuring data confidentiality, integrity, and availability in today's interconnected world.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131293620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Known Unknowns: The Inevitability of Cyber Attacks 已知的未知:网络攻击的必然性
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1316
V. Greiman
As described by Former U.S. Secretary of Defense, Donald Rumsfeld in his 2011 book, Known and Unknown, “there are many things of which we are completely unaware—in fact, there are things of which we are so unaware, we don’t even know we are unaware of them.  Throughout history the world has faced numerous catastrophic events that were not foreseen but in hindsight were discoverable including the devastating effects of Pearl Harbor, and the September 11 terrorist attacks. More recently, the potential for catastrophic loss has been magnified in the 2020 Solar Winds and 2021 Colonial Pipeline cyber-attacks. We may not know when or how these events will occur or how much damage or destruction will occur, but we do know that these events are possible. The literature differentiates between events that occur totally by surprise, and outcomes or events that actors have identified as possibly existing but do not know whether they will take place or not. The aim of this paper is to provide insight, based on an empirical review of selected attacks both within and outside the cyber space literature to uncover the underlying risk, uncertainty, and complexity that may have been known but not seriously considered by those who had the knowledge and capability to investigate the warning signs. Based on the case study analysis, this paper will present the reasons for inaction and how we can learn from these experiences. The following two theories – institutionalization and rationalization have been found to provide some reasons for the occurrence of behaviors which increase the possibility of unobserved risks. In this paper we explore these theories through case study analysis and  propose a framework consisting of four concepts for increasing awareness of these situations.
正如美国前国防部长唐纳德·拉姆斯菲尔德在他2011年出版的《已知与未知》一书中所描述的那样,“有很多事情是我们完全不知道的——事实上,有些事情是我们如此不知道的,我们甚至不知道我们不知道它们。”纵观历史,世界面临着许多无法预见但事后发现的灾难性事件,包括珍珠港的破坏性影响和9月11日的恐怖袭击。最近,在2020年的太阳风和2021年的殖民管道网络攻击中,灾难性损失的可能性被放大了。我们可能不知道这些事件何时或如何发生,也不知道会造成多大的破坏或破坏,但我们知道这些事件是可能发生的。文献区分了完全意外发生的事件和参与者已经确定可能存在但不知道是否会发生的结果或事件。本文的目的是提供洞察力,基于对网络空间文献内外选定攻击的经验审查,以揭示潜在的风险、不确定性和复杂性,这些风险、不确定性和复杂性可能已经知道,但没有被那些有知识和能力调查警告信号的人认真考虑。本文将在案例分析的基础上,提出不作为的原因以及我们如何从这些经验中吸取教训。研究发现,以下两种理论——制度化和合理化——为增加未被察觉风险可能性的行为的发生提供了一些原因。在本文中,我们通过案例分析来探讨这些理论,并提出了一个由四个概念组成的框架,以提高对这些情况的认识。
{"title":"Known Unknowns: The Inevitability of Cyber Attacks","authors":"V. Greiman","doi":"10.34190/eccws.22.1.1316","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1316","url":null,"abstract":"As described by Former U.S. Secretary of Defense, Donald Rumsfeld in his 2011 book, Known and Unknown, “there are many things of which we are completely unaware—in fact, there are things of which we are so unaware, we don’t even know we are unaware of them.  Throughout history the world has faced numerous catastrophic events that were not foreseen but in hindsight were discoverable including the devastating effects of Pearl Harbor, and the September 11 terrorist attacks. More recently, the potential for catastrophic loss has been magnified in the 2020 Solar Winds and 2021 Colonial Pipeline cyber-attacks. We may not know when or how these events will occur or how much damage or destruction will occur, but we do know that these events are possible. The literature differentiates between events that occur totally by surprise, and outcomes or events that actors have identified as possibly existing but do not know whether they will take place or not. The aim of this paper is to provide insight, based on an empirical review of selected attacks both within and outside the cyber space literature to uncover the underlying risk, uncertainty, and complexity that may have been known but not seriously considered by those who had the knowledge and capability to investigate the warning signs. Based on the case study analysis, this paper will present the reasons for inaction and how we can learn from these experiences. The following two theories – institutionalization and rationalization have been found to provide some reasons for the occurrence of behaviors which increase the possibility of unobserved risks. In this paper we explore these theories through case study analysis and  propose a framework consisting of four concepts for increasing awareness of these situations.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125293985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Reflection on Typology and Verification Flaws in consideration of Biocybersecurity/Cyberbiosecurity: Just Another Gap in the Wall 对生物网络安全的类型学和验证缺陷的反思/网络生物安全:只是墙上的另一个缺口
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1271
Lucas Potter, Kimberly Mossberg, X. Palmer
Verification is central to any process in a functional and enduring cyber-secure organization. This verification ishow the validity or accuracy of a state of being is assessed (Schlick, 1936; Balci, 1998). Conversely, breakdownin verification procedures is core to the interruption of normal operations for an organization. A key problemfor organizations that utilize biology as an interlock within their systems is that personnel lack sufficient abilityto verify all practically relevant biological information for procedures such as a nurse logging a blood draw, or amolecular biology technician preparing agar to culture microbes for study. This has several implications, one ofwhich is our diminished ability to approximate and defend against emerging biologically-linked cyberthreats.These could be in the form of mis- or dis-information, contaminants, or calculated threats to vital supplies.Two important questions to ask are: “What may be the implications of diminished ability to undergo strictverification measures (such as triple redundancy and technological distancing).” And “how does this impactour ability to anticipate and make changes for verification of biological processes?” This paper aims to discusskey areas where verification gaps exist and how to bridgethos gaps. Towards this, we cover data integrity,implications of the lack of verification, triple redundancy, technological distancing, biosafety concerns, andmore. All of this will factor into the ability of organizations with proximity to biosecurity to anticipate nationalchanges to biological processes that are nationally relevant.
在一个功能性和持久的网络安全组织中,验证是任何过程的核心。这种验证表明存在状态的有效性或准确性被评估(Schlick, 1936;Balci, 1998)。相反,验证程序的中断是组织正常运作中断的核心。对于利用生物学作为其系统内联锁的组织来说,一个关键问题是人员缺乏足够的能力来验证所有实际相关的生物信息,例如护士记录抽血,或分子生物学技术人员准备琼脂培养微生物进行研究。这有几个含义,其中之一是我们逼近和防御新兴的生物相关网络威胁的能力下降。这些可能以错误或虚假信息、污染物或对重要供应的蓄意威胁的形式出现。要问的两个重要问题是:“经过严格核查措施(如三重冗余和技术距离)的能力减弱可能意味着什么?”“这对预测和改变生物过程验证的能力有何影响?”本文旨在讨论存在验证差距的关键领域以及如何弥合这些差距。为此,我们涵盖了数据完整性、缺乏验证的影响、三重冗余、技术距离、生物安全问题等等。所有这些都将影响到与生物安全相关的组织预测与国家相关的生物过程的国家变化的能力。
{"title":"A Reflection on Typology and Verification Flaws in consideration of Biocybersecurity/Cyberbiosecurity: Just Another Gap in the Wall","authors":"Lucas Potter, Kimberly Mossberg, X. Palmer","doi":"10.34190/eccws.22.1.1271","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1271","url":null,"abstract":"Verification is central to any process in a functional and enduring cyber-secure organization. This verification ishow the validity or accuracy of a state of being is assessed (Schlick, 1936; Balci, 1998). Conversely, breakdownin verification procedures is core to the interruption of normal operations for an organization. A key problemfor organizations that utilize biology as an interlock within their systems is that personnel lack sufficient abilityto verify all practically relevant biological information for procedures such as a nurse logging a blood draw, or amolecular biology technician preparing agar to culture microbes for study. This has several implications, one ofwhich is our diminished ability to approximate and defend against emerging biologically-linked cyberthreats.These could be in the form of mis- or dis-information, contaminants, or calculated threats to vital supplies.Two important questions to ask are: “What may be the implications of diminished ability to undergo strictverification measures (such as triple redundancy and technological distancing).” And “how does this impactour ability to anticipate and make changes for verification of biological processes?” This paper aims to discusskey areas where verification gaps exist and how to bridgethos gaps. Towards this, we cover data integrity,implications of the lack of verification, triple redundancy, technological distancing, biosafety concerns, andmore. All of this will factor into the ability of organizations with proximity to biosecurity to anticipate nationalchanges to biological processes that are nationally relevant.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133670331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tackling Uncertainty Through Probabilistic Modelling of Proportionality in Military Operations 通过军事行动中的比例概率建模来解决不确定性
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1072
Clara Maathuis, S. Chockalingam
Just as every neuron in a biological neural network is a reinforcement learning agent, thus a component of a large and advanced structure is de facto a model, the two main components forming the principle of proportionality in military operations can be seen and are as a matter of fact two different entities and models. These are collateral damage depicting the unintentional effects affecting civilians and civilian objects, and military advantage symbolizing the intentional effects contributing to achieving the military objectives defined for military operation conducted. These two entities are complex processes relying on available information, projection on time to the moment of target engagement through estimation and are strongly dependent of common-sense reasoning and decision making. As a deduction, these two components and the proportionality decision result are processes surrounded by various sources and types of uncertainty. However, the existing academic and practitioner efforts in understanding the meaning, dimensions, and implications of the proportionality principle are considering military-legal and ethical lenses, and less technical ones. Accordingly, this research calls for a movement from the existing vision of interpreting proportionality in a possibilistic way to a probabilistic way. Henceforth, this research aims to build two probabilistic Machine Learning models based on Bayesian Belief Networks for assessing proportionality in military operations. The first model embeds a binary classification approach assessing if the engagement is proportional or disproportional, and the second model that extends this perspective based on previous research to perform multi-class classification for assessing degrees of proportionality. To accomplish this objective, this research follows the Design Science Research methodology and conducts an extensive literature for building and demonstrating the model proposed. Finally, this research intends to contribute to designing and developing explainable and responsible intelligent solutions that support human-based military targeting decision-making processes involved when building and conducting military operations.
正如生物神经网络中的每个神经元都是一个强化学习代理,因此一个大型高级结构的组成部分实际上是一个模型,在军事行动中形成比例原则的两个主要组成部分可以看到,实际上是两个不同的实体和模型。附带损害是指影响平民和民用物体的无意影响,军事优势是指有助于实现为所进行的军事行动确定的军事目标的有意影响。这两个实体是依赖于可用信息的复杂过程,通过估计对目标接触时刻的时间预测,并且强烈依赖于常识推理和决策。作为演绎,这两个组成部分和比例性决策结果是被各种不确定性来源和类型所包围的过程。然而,在理解比例原则的含义、维度和含义方面,现有的学术和实践努力正在考虑军事-法律和伦理方面的问题,而较少考虑技术方面的问题。因此,本研究要求从现有的以可能性的方式解释比例性的观点转向以概率的方式。因此,本研究旨在建立两个基于贝叶斯信念网络的概率机器学习模型,用于评估军事行动中的比例性。第一个模型嵌入了一种二元分类方法来评估敬业度是成比例的还是不成比例的,第二个模型在先前研究的基础上扩展了这一视角,进行了多类分类来评估比例程度。为了实现这一目标,本研究遵循设计科学研究方法,并进行了广泛的文献研究,以建立和展示所提出的模型。最后,本研究旨在为设计和开发可解释和负责任的智能解决方案做出贡献,以支持在建立和开展军事行动时涉及的以人为本的军事目标决策过程。
{"title":"Tackling Uncertainty Through Probabilistic Modelling of Proportionality in Military Operations","authors":"Clara Maathuis, S. Chockalingam","doi":"10.34190/eccws.22.1.1072","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1072","url":null,"abstract":"Just as every neuron in a biological neural network is a reinforcement learning agent, thus a component of a large and advanced structure is de facto a model, the two main components forming the principle of proportionality in military operations can be seen and are as a matter of fact two different entities and models. These are collateral damage depicting the unintentional effects affecting civilians and civilian objects, and military advantage symbolizing the intentional effects contributing to achieving the military objectives defined for military operation conducted. These two entities are complex processes relying on available information, projection on time to the moment of target engagement through estimation and are strongly dependent of common-sense reasoning and decision making. As a deduction, these two components and the proportionality decision result are processes surrounded by various sources and types of uncertainty. However, the existing academic and practitioner efforts in understanding the meaning, dimensions, and implications of the proportionality principle are considering military-legal and ethical lenses, and less technical ones. Accordingly, this research calls for a movement from the existing vision of interpreting proportionality in a possibilistic way to a probabilistic way. Henceforth, this research aims to build two probabilistic Machine Learning models based on Bayesian Belief Networks for assessing proportionality in military operations. The first model embeds a binary classification approach assessing if the engagement is proportional or disproportional, and the second model that extends this perspective based on previous research to perform multi-class classification for assessing degrees of proportionality. To accomplish this objective, this research follows the Design Science Research methodology and conducts an extensive literature for building and demonstrating the model proposed. Finally, this research intends to contribute to designing and developing explainable and responsible intelligent solutions that support human-based military targeting decision-making processes involved when building and conducting military operations.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132008703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Commentary and Exploration of Maritime Applications of Biosecurity and Cybersecurity Intersections 生物安全与网络安全交叉领域海事应用述评与探索
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1283
M. Barnett, I. Samori, Brandon Griffin, X. Palmer, Lucas Potter
Prior work has discussed the emerging fields of Biocybersecurity (BCS) and Cyberbiosecurity (CBS) in multiple forms. These include the definition, mission-awareness, general applications, and policy (Murch et al, 2018; Peccoud et al, 2019; Potter et al, 2020). One area that has received relatively little attention are unique BCS/CBS vulnerabilities with maritime theaters, which refers to ocean and littoral-based commercial and military ventures. There is considerable ground for both bioeconomies and militaries to be placed at risk of degraded capacity for activity due to maritime-specific BCS/CBS attacks presently in the future. This is especially the case where aforementioned vulnerabilities are used to disrupt logistics through targeting of personnel and means of transport. This paper discusses the growing relevance of CBS/BCS in maritime space, aspects of maritime environments that can be exploited for BCS attacks, possible BCS/CBS attacks in the near future, possible BCS/CBS means of defense and pre-emptive positioning, and discussion of BCS/CBS relevance in international policy, and differences in application. This paper aims to facilitate and accelerate discussion of BCS to spur helpful action in this area.
先前的工作以多种形式讨论了生物网络安全(BCS)和网络生物安全(CBS)的新兴领域。这些包括定义、任务意识、一般应用和策略(Murch等人,2018;Peccoud等人,2019;Potter et al ., 2020)。一个受到相对较少关注的领域是海上战区独特的BCS/CBS漏洞,这是指海洋和沿海的商业和军事冒险。由于目前和未来针对海洋的BCS/CBS攻击,生物经济和军队都有相当大的理由面临活动能力下降的风险。特别是在利用上述漏洞以人员和运输工具为目标来破坏后勤的情况下。本文讨论了CBS/BCS在海上空间日益增长的相关性,可用于BCS攻击的海洋环境方面,不久的将来可能发生的BCS/CBS攻击,可能的BCS/CBS防御手段和先发制人的定位,以及BCS/CBS在国际政策中的相关性和应用差异的讨论。本文旨在促进和加快对BCS的讨论,以推动这一领域的有益行动。
{"title":"A Commentary and Exploration of Maritime Applications of Biosecurity and Cybersecurity Intersections","authors":"M. Barnett, I. Samori, Brandon Griffin, X. Palmer, Lucas Potter","doi":"10.34190/eccws.22.1.1283","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1283","url":null,"abstract":"Prior work has discussed the emerging fields of Biocybersecurity (BCS) and Cyberbiosecurity (CBS) in multiple forms. These include the definition, mission-awareness, general applications, and policy (Murch et al, 2018; Peccoud et al, 2019; Potter et al, 2020). One area that has received relatively little attention are unique BCS/CBS vulnerabilities with maritime theaters, which refers to ocean and littoral-based commercial and military ventures. There is considerable ground for both bioeconomies and militaries to be placed at risk of degraded capacity for activity due to maritime-specific BCS/CBS attacks presently in the future. This is especially the case where aforementioned vulnerabilities are used to disrupt logistics through targeting of personnel and means of transport. This paper discusses the growing relevance of CBS/BCS in maritime space, aspects of maritime environments that can be exploited for BCS attacks, possible BCS/CBS attacks in the near future, possible BCS/CBS means of defense and pre-emptive positioning, and discussion of BCS/CBS relevance in international policy, and differences in application. This paper aims to facilitate and accelerate discussion of BCS to spur helpful action in this area.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114219185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards an active cyber defence framework for SMMEs in developing countries 为发展中国家的中小企业建立积极的网络防御框架
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1053
Nombeko Ntingi, Sebastian von Solms, Jaco du Toit
Small, medium, and micro enterprises (SMMEs) are obliged to adopt digital technologies to render services to their clients and remain competitive. The COVID-19 global crisis has accelerated the cyberfication of systems and services. The move to digital platforms has afforded SMMEs opportunities to offer their services to a broader geographical area. However, this has also presented opportunities for cybercriminals to invade the digital infrastructure. Adopting digital transformation has put SMMEs in a vulnerable position since they need to manage their cybersecurity while lacking the necessary skills and ICT infrastructure. The inability of SMMEs to defend themselves against cyberattacks compels them to outsource their security needs to external security service providers. These external security service providers offer security services based on a hierarchical operating model. Essential security services are offered at a lower level. If the paying clients require advanced security services, they may be provided as an add-on to the contractual agreement resulting in additional cost.   This paper explores the active cyber defence (ACD) approach to enhance cybersecurity defence while minimising service costs. Therefore, the primary objective and outcome of this paper are to identify some of the essential drivers that will contribute towards developing the active cyber defence framework for SMMEs in developing countries. For purposes of clarity, essential drivers are the gaps highlighted during the literature review and will be referred to as “essential drivers” throughout the paper. The essential drivers, together with suggested recommendations, will be consolidated. The essential drivers were drawn from existing literature by going through peer-reviewed academic papers and company whitepapers.   To achieve the primary objective, we need to establish whether SMMEs are utilising the services of external security service providers. The external security service providers will be referred to as “Security Operation Centre - SOC as a service” throughout the paper. The secondary objective of this paper is to determine whether SMMEs are utilising the SOC as a service and if they do, whether they realise value for money.    
中小微企业必须采用数字技术为客户提供服务,保持竞争力。2019冠状病毒病全球危机加速了系统和服务的网络化。向数字平台的转变为中小企业提供了向更广泛的地理区域提供服务的机会。然而,这也为网络罪犯入侵数字基础设施提供了机会。采用数字化转型使中小企业处于弱势地位,因为他们需要管理网络安全,同时缺乏必要的技能和信息通信技术基础设施。中小企业无力抵御网络攻击,迫使它们将安全需求外包给外部安全服务提供商。这些外部安全服务提供者基于分层操作模型提供安全服务。基本安全服务在较低级别提供。如果付费客户需要高级保安服务,可以作为合同协议的附加条款提供,从而产生额外费用。本文探讨了主动网络防御(ACD)方法,以增强网络安全防御,同时最小化服务成本。因此,本文的主要目标和结果是确定一些基本驱动因素,这些驱动因素将有助于为发展中国家的中小企业开发积极的网络防御框架。为了清晰起见,基本驱动因素是在文献综述中突出显示的空白,并将在整篇论文中称为“基本驱动因素”。将整合基本驱动因素以及提出的建议。主要的驱动因素是通过查阅同行评议的学术论文和公司白皮书,从现有文献中得出的。为了实现主要目标,我们需要确定中小企业是否正在使用外部安全服务提供商的服务。外部安全服务提供商将在整个文件中称为“安全运营中心- SOC即服务”。本文的第二个目标是确定中小企业是否正在利用SOC作为一种服务,如果他们这样做,他们是否实现了物有所值。
{"title":"Towards an active cyber defence framework for SMMEs in developing countries","authors":"Nombeko Ntingi, Sebastian von Solms, Jaco du Toit","doi":"10.34190/eccws.22.1.1053","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1053","url":null,"abstract":"Small, medium, and micro enterprises (SMMEs) are obliged to adopt digital technologies to render services to their clients and remain competitive. The COVID-19 global crisis has accelerated the cyberfication of systems and services. The move to digital platforms has afforded SMMEs opportunities to offer their services to a broader geographical area. However, this has also presented opportunities for cybercriminals to invade the digital infrastructure. Adopting digital transformation has put SMMEs in a vulnerable position since they need to manage their cybersecurity while lacking the necessary skills and ICT infrastructure. The inability of SMMEs to defend themselves against cyberattacks compels them to outsource their security needs to external security service providers. These external security service providers offer security services based on a hierarchical operating model. Essential security services are offered at a lower level. If the paying clients require advanced security services, they may be provided as an add-on to the contractual agreement resulting in additional cost. \u0000  \u0000This paper explores the active cyber defence (ACD) approach to enhance cybersecurity defence while minimising service costs. Therefore, the primary objective and outcome of this paper are to identify some of the essential drivers that will contribute towards developing the active cyber defence framework for SMMEs in developing countries. For purposes of clarity, essential drivers are the gaps highlighted during the literature review and will be referred to as “essential drivers” throughout the paper. The essential drivers, together with suggested recommendations, will be consolidated. The essential drivers were drawn from existing literature by going through peer-reviewed academic papers and company whitepapers. \u0000  \u0000To achieve the primary objective, we need to establish whether SMMEs are utilising the services of external security service providers. The external security service providers will be referred to as “Security Operation Centre - SOC as a service” throughout the paper. The secondary objective of this paper is to determine whether SMMEs are utilising the SOC as a service and if they do, whether they realise value for money. \u0000  \u0000 ","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129348437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Complicity in Unlawful Offensive Cyber Operations Under International Law on State Responsibility 根据国家责任国际法的非法进攻性网络行动的共犯
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1114
S. Haataja
States are increasingly engaging in cybersecurity cooperation activities and providing support to other states in offensive cyber operations. While international cooperation is generally encouraged and many cybersecurity cooperation activities are lawful, there is also a risk of being complicit in the internationally wrongful acts of other states. This paper examines the risk of complicity in offensive cyber operations under international law on aiding or assisting. It argues that, while international law in this context applies to cyber operations by states, existing uncertainties and limitations around the key components of the law on aiding or assisting are compounded by competing interpretations about how international law generally applies to state conduct in cyberspace. The paper consists of four sections. Following the introduction in section one, section two outlines some of the ways in which states are cooperating in relation to cybersecurity and offensive cyber operations. Section three examines the key elements of international law on aiding or assisting as contained within article 16 of the International Law Commission’s Articles on the Responsibility of States for Internationally Wrongful Acts, and the extent to which these apply or are problematised in relation cyber operations. It demonstrates that article 16 adopts a broad approach to what constitutes ‘aiding or assisting’ and this captures various types of activities in support of cyber operations provided the aid or assistance contributes significantly to a wrongful act of another state, the accomplice state has knowledge of the factual circumstances and the illegality of the act by the principal state, and where the accomplice state and principal state are bound by the same legal obligation. Section four concludes by outlining the limits of cooperation in the cyber context and how states can mitigate the risk of complicity in violations of international law.
各国越来越多地参与网络安全合作活动,并在进攻性网络行动中为其他国家提供支持。虽然国际合作普遍受到鼓励,许多网络安全合作活动是合法的,但也存在成为其他国家国际不法行为同谋的风险。本文根据国际法对协助或协助的规定,探讨了在进攻性网络行动中合谋的风险。它认为,虽然这方面的国际法适用于国家的网络行动,但围绕援助或协助法律关键组成部分的现有不确定性和局限性,由于对国际法一般如何适用于网络空间中的国家行为的相互矛盾的解释而变得更加复杂。本文由四个部分组成。继第一节的介绍之后,第二节概述了各国在网络安全和攻击性网络行动方面合作的一些方式。第三节审查国际法委员会《国家对国际不法行为的责任条款》第16条所载的关于援助或协助的国际法关键要素,以及这些要素在网络行动中适用或存在问题的程度。它表明,第16条对什么构成“协助或协助”采取了广泛的方法,这涵盖了支持网络行动的各种类型的活动,前提是援助或协助对另一国的不法行为有重大贡献,共犯国了解事实情况和主犯国行为的非法性,以及共犯国和主犯国受到相同法律义务的约束。第四部分最后概述了网络环境下合作的局限性,以及各国如何减轻违反国际法的合谋风险。
{"title":"Complicity in Unlawful Offensive Cyber Operations Under International Law on State Responsibility","authors":"S. Haataja","doi":"10.34190/eccws.22.1.1114","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1114","url":null,"abstract":"States are increasingly engaging in cybersecurity cooperation activities and providing support to other states in offensive cyber operations. While international cooperation is generally encouraged and many cybersecurity cooperation activities are lawful, there is also a risk of being complicit in the internationally wrongful acts of other states. This paper examines the risk of complicity in offensive cyber operations under international law on aiding or assisting. It argues that, while international law in this context applies to cyber operations by states, existing uncertainties and limitations around the key components of the law on aiding or assisting are compounded by competing interpretations about how international law generally applies to state conduct in cyberspace. The paper consists of four sections. Following the introduction in section one, section two outlines some of the ways in which states are cooperating in relation to cybersecurity and offensive cyber operations. Section three examines the key elements of international law on aiding or assisting as contained within article 16 of the International Law Commission’s Articles on the Responsibility of States for Internationally Wrongful Acts, and the extent to which these apply or are problematised in relation cyber operations. It demonstrates that article 16 adopts a broad approach to what constitutes ‘aiding or assisting’ and this captures various types of activities in support of cyber operations provided the aid or assistance contributes significantly to a wrongful act of another state, the accomplice state has knowledge of the factual circumstances and the illegality of the act by the principal state, and where the accomplice state and principal state are bound by the same legal obligation. Section four concludes by outlining the limits of cooperation in the cyber context and how states can mitigate the risk of complicity in violations of international law.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124731651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Issues of GPUs and FPGAs for AI-powered near & far Edge Services ai驱动的近边缘和远边缘服务的gpu和fpga的安全问题
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1160
Stylianos Koumoutzelis, I. Giannoulakis, Titos Georgoulakis, G. Avdikos, E. Kafetzakis
Graphics Processing Units (GPUs) and Field Programmable Gate Arrays (FPGAs) are widely applied to cloud and embedded applications in which such devices are applied to near and far edge computing operations. This pool of available devices has a wide range of power/size specifications to support servers ranging from big data centres to small cloudlets, or even down to embedded systems and IoT boards. Overall, the most prominent devices and vendors in the market today are the following Xilinx for FPGA-based accelerators, Nvidia and AMD for GPUs, Intel for FPGA- /GPU-based accelerators. Decreasing the latency and increasing the throughput of Artificial Intelligence Functions (AIF), either for network automation or user applications, requires some sort of parallelization inside such purpose-built hardware acceleration. The AI@EDGE project is developing a Connect-Compute Platform (CCP) in which hardware accelerators (1 Nvidia GPU Tesla V100 (near edge device) and 1 Jetson AGX and 1 Jetson Nano (far edge devices), as well as 2 Xilinx FPGAs Alveo U280+U200 (near edge devices) and 1 Versal VCK190 and 2 Zynq ZCU104) are placed inside a server node and execute edge computing scenarios involving multiple nodes of diverse compute capabilities each, to test various integration approaches, to study orchestration techniques measure AIF deployment efficiency, all while developing certain FPGA/GPU code to accelerate representative AIFs of AI@EDGE. In this paper we compare the power/size/performance specifications of all accelerators and highlight the security issues associated with the cloud and embedded accelerators. This study presents the security issues announced by the vendors with the results of our tests and proposes tests and security functions (policies and objectives) which will be applied to the CCP to increase the security level of CCP. It also considers security issues related with the hardware set-up (accelerators inside server nodes) from the network point of view.
图形处理单元(gpu)和现场可编程门阵列(fpga)广泛应用于云和嵌入式应用,其中这些设备应用于近边缘和远边缘计算操作。这个可用设备池具有广泛的功率/尺寸规格,以支持从大型数据中心到小型云计算,甚至到嵌入式系统和物联网板的服务器。总的来说,目前市场上最突出的设备和供应商是基于FPGA的加速器的赛灵思,gpu的英伟达和AMD,基于FPGA / gpu的加速器的英特尔。对于网络自动化或用户应用程序,减少延迟和增加人工智能功能(AIF)的吞吐量需要在这种专用硬件加速中进行某种并行化。AI@EDGE项目正在开发一个连接计算平台(CCP),其中硬件加速器(1个Nvidia GPU Tesla V100(近边缘设备)和1个Jetson AGX和1个Jetson Nano(远边缘设备),以及2个Xilinx fpga Alveo U280+U200(近边缘设备)和1个Versal VCK190和2个Zynq ZCU104)被放置在服务器节点内,并执行涉及多个不同计算能力节点的边缘计算场景,以测试各种集成方法。研究编排技术,测量AIF的部署效率,同时开发特定的FPGA/GPU代码来加速AI@EDGE的代表性AIF。在本文中,我们比较了所有加速器的功率/尺寸/性能规格,并强调了与云和嵌入式加速器相关的安全问题。本研究将供应商公布的安全问题与我们的测试结果相结合,并提出将应用于CCP的测试和安全功能(策略和目标),以提高CCP的安全水平。它还从网络的角度考虑了与硬件设置(服务器节点内的加速器)相关的安全问题。
{"title":"Security Issues of GPUs and FPGAs for AI-powered near & far Edge Services","authors":"Stylianos Koumoutzelis, I. Giannoulakis, Titos Georgoulakis, G. Avdikos, E. Kafetzakis","doi":"10.34190/eccws.22.1.1160","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1160","url":null,"abstract":"Graphics Processing Units (GPUs) and Field Programmable Gate Arrays (FPGAs) are widely applied to cloud and embedded applications in which such devices are applied to near and far edge computing operations. This pool of available devices has a wide range of power/size specifications to support servers ranging from big data centres to small cloudlets, or even down to embedded systems and IoT boards. Overall, the most prominent devices and vendors in the market today are the following Xilinx for FPGA-based accelerators, Nvidia and AMD for GPUs, Intel for FPGA- /GPU-based accelerators. Decreasing the latency and increasing the throughput of Artificial Intelligence Functions (AIF), either for network automation or user applications, requires some sort of parallelization inside such purpose-built hardware acceleration. The AI@EDGE project is developing a Connect-Compute Platform (CCP) in which hardware accelerators (1 Nvidia GPU Tesla V100 (near edge device) and 1 Jetson AGX and 1 Jetson Nano (far edge devices), as well as 2 Xilinx FPGAs Alveo U280+U200 (near edge devices) and 1 Versal VCK190 and 2 Zynq ZCU104) are placed inside a server node and execute edge computing scenarios involving multiple nodes of diverse compute capabilities each, to test various integration approaches, to study orchestration techniques measure AIF deployment efficiency, all while developing certain FPGA/GPU code to accelerate representative AIFs of AI@EDGE. In this paper we compare the power/size/performance specifications of all accelerators and highlight the security issues associated with the cloud and embedded accelerators. This study presents the security issues announced by the vendors with the results of our tests and proposes tests and security functions (policies and objectives) which will be applied to the CCP to increase the security level of CCP. It also considers security issues related with the hardware set-up (accelerators inside server nodes) from the network point of view.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"325 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130023708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
European Conference on Cyber Warfare and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1