首页 > 最新文献

European Conference on Cyber Warfare and Security最新文献

英文 中文
Teaching pentesting to social sciences students using experiential learning techniques to improve attitudes towards possible cybersecurity careers 使用体验式学习技术向社会科学专业的学生教授渗透测试,以提高他们对可能的网络安全职业的态度
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1145
Aleksandras Melnikovas, R. Lugo, Kaie Maennel, A. Brilingaitė, Stefan Sütterlin, A. Juozapavičius
Labor market analysis shows that there is a significant shortage of experienced cybersecurity professionals, and this trend is expected to continue in the future. In addition, young people who are reluctant to choose STEM subjects in school typically do not see cybersecurity as a part of their future because they believe it demands exclusive technical knowledge that is beyond their reach. We aimed to change this perception among students of the social sciences, assuming that by providing social science students with the basics of cybersecurity, it would be possible to raise their awareness and encourage them to consider this field as a potential career option. Our team has designed a concise technical course based on Kolb's model that employs experiential learning to provide students with a basic knowledge of ethical intrusion (penetration testing). During the 32-hour subject, cadet officers with no prior IT education experienced all the steps of hacking both into a remotely accessible and physically accessible computer, including initial reconnaissance, vulnerability scanning, exploitation, and privilege escalation. A hands-on practical task of breaking into a highly vulnerable remote computer allowed for the evaluation of knowledge and skills as well as the reinforcement of learning experiences. In order to assess how the students' perceptions of the cybersecurity profession have changed based on the theory of planned behavior, they were asked to provide feedback immediately after the course and one year later. The results indicate that the short, technically challenging, but practical course based on experiential learning had a significant and positive effect on participants' attitudes: they were substantially more likely to consider cybersecurity as a future career, and some of them began participating in other cybersecurity courses or activities. It is reasonable to assume, therefore, that providing similar technical courses to social science students will encourage them to pursue cybersecurity-related careers in the future.
劳动力市场分析显示,有经验的网络安全专业人员严重短缺,这一趋势预计将在未来持续下去。此外,不愿在学校选择STEM科目的年轻人通常不认为网络安全是他们未来的一部分,因为他们认为这需要他们无法企及的独家技术知识。我们的目标是改变社会科学学生的这种看法,假设通过为社会科学学生提供网络安全的基础知识,有可能提高他们的意识,并鼓励他们将这一领域作为潜在的职业选择。我们的团队根据Kolb的模型设计了一门简明的技术课程,采用体验式学习的方式为学生提供道德入侵(渗透测试)的基本知识。在32小时的课程中,没有受过IT教育的学员们经历了入侵远程可访问和物理可访问计算机的所有步骤,包括初始侦察、漏洞扫描、利用和特权升级。一个动手的实际任务,闯入一个高度脆弱的远程计算机允许知识和技能的评估,并加强学习经验。为了评估学生对网络安全职业的看法是如何根据计划行为理论发生变化的,他们被要求在课程结束后立即和一年后提供反馈。结果表明,基于体验式学习的短期、技术上具有挑战性但实用的课程对参与者的态度产生了显著的积极影响:他们更有可能将网络安全视为未来的职业,其中一些人开始参加其他网络安全课程或活动。因此,我们可以合理地假设,为社会科学专业的学生提供类似的技术课程,将鼓励他们在未来从事与网络安全相关的职业。
{"title":"Teaching pentesting to social sciences students using experiential learning techniques to improve attitudes towards possible cybersecurity careers","authors":"Aleksandras Melnikovas, R. Lugo, Kaie Maennel, A. Brilingaitė, Stefan Sütterlin, A. Juozapavičius","doi":"10.34190/eccws.22.1.1145","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1145","url":null,"abstract":"Labor market analysis shows that there is a significant shortage of experienced cybersecurity professionals, and this trend is expected to continue in the future. In addition, young people who are reluctant to choose STEM subjects in school typically do not see cybersecurity as a part of their future because they believe it demands exclusive technical knowledge that is beyond their reach. We aimed to change this perception among students of the social sciences, assuming that by providing social science students with the basics of cybersecurity, it would be possible to raise their awareness and encourage them to consider this field as a potential career option. Our team has designed a concise technical course based on Kolb's model that employs experiential learning to provide students with a basic knowledge of ethical intrusion (penetration testing). During the 32-hour subject, cadet officers with no prior IT education experienced all the steps of hacking both into a remotely accessible and physically accessible computer, including initial reconnaissance, vulnerability scanning, exploitation, and privilege escalation. A hands-on practical task of breaking into a highly vulnerable remote computer allowed for the evaluation of knowledge and skills as well as the reinforcement of learning experiences. In order to assess how the students' perceptions of the cybersecurity profession have changed based on the theory of planned behavior, they were asked to provide feedback immediately after the course and one year later. The results indicate that the short, technically challenging, but practical course based on experiential learning had a significant and positive effect on participants' attitudes: they were substantially more likely to consider cybersecurity as a future career, and some of them began participating in other cybersecurity courses or activities. It is reasonable to assume, therefore, that providing similar technical courses to social science students will encourage them to pursue cybersecurity-related careers in the future.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127693897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Zero Trust: The Magic Bullet or Devil’s Advocate? 零信任:灵丹妙药还是魔鬼代言人?
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1263
Helvi Salminen
The concept of Zero trust was first introduced in mid 1990’s, and has gradually attracted increasing attention. This approach to building organizations’ information system infrastructures has been developed as response to increasing interaction and interconnection of information systems. Along with organizational boundaries have become less clear with the new business models where a business process exceeds the organizational boundaries, also the boundaries of information systems are no longer clear. In this interconnected world the purely perimeter-based security model defining zones of trusted entities inside the perimeter and the untrusted external world outside the perimeter no longer serves the needs of new business models. And the combination of complex technology and sophisticated attack methods it is no longer possible to be sure that all system components and actors inside the perimeter can be trusted. The Zero trust approach brings the sophisticated controls from the perimeter to the entire system. The core idea can be expressed with the four words “never trust, always verify”. No system component is by default trusted , and one-time verification is not sufficient – access to a resource must be verified at each connection attempt. Mutual authentication of the communicating parties is in the core of the approach. But does the zero trust approach have unwanted side-effects? The complexity of the system increases when new control layers are built, and system complexity can increase the possibility of configuration errors. Can there be other side-effects as well? The need for trust does not disappear even when the systems are built on the zero trust principles. When studying the zero trust approach the author started thinking what would happen in human interaction and organizational co-operation if they are based on or partly apply the zero trust approach. And the scenarios were quite gloomy. But is this only a nightmare or already at least partly present in our reality? This article describes the zero trust approach and its applicability to technical environments. The second part present scenarios of the impacts which application of zero trust principles could have – or maybe already has - in human communication and organizational relationships.
零信任的概念最早出现于20世纪90年代中期,并逐渐受到人们的关注。这种建立组织信息系统基础设施的方法是为了响应信息系统之间日益增加的相互作用和相互联系而发展起来的。随着业务流程超出组织边界的新业务模型使组织边界变得不那么清晰,信息系统的边界也不再清晰。在这个相互连接的世界中,纯粹基于边界的安全模型定义了边界内可信实体和边界外不可信外部世界的区域,不再满足新业务模型的需求。复杂的技术和复杂的攻击方法相结合,不再可能确保所有系统组件和外围参与者都是可信的。零信任方法将复杂的控制从外围带到整个系统。核心思想可以用四个字来表达:“永不信任,永远验证”。默认情况下,没有系统组件是受信任的,并且一次性验证是不够的——必须在每次连接尝试时验证对资源的访问。通信双方的相互认证是该方法的核心。但是,零信任方法是否有不必要的副作用呢?当建立新的控制层时,系统的复杂性会增加,并且系统复杂性会增加配置错误的可能性。还有其他副作用吗?即使系统建立在零信任原则之上,对信任的需求也不会消失。在研究零信任方法时,作者开始思考如果基于或部分应用零信任方法,人类互动和组织合作将会发生什么。而且前景相当黯淡。但这只是一场噩梦,还是已经部分存在于我们的现实中?本文描述了零信任方法及其在技术环境中的适用性。第二部分介绍了应用零信任原则在人际沟通和组织关系中可能产生或可能已经产生的影响的场景。
{"title":"Zero Trust: The Magic Bullet or Devil’s Advocate?","authors":"Helvi Salminen","doi":"10.34190/eccws.22.1.1263","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1263","url":null,"abstract":"The concept of Zero trust was first introduced in mid 1990’s, and has gradually attracted increasing attention. This approach to building organizations’ information system infrastructures has been developed as response to increasing interaction and interconnection of information systems. Along with organizational boundaries have become less clear with the new business models where a business process exceeds the organizational boundaries, also the boundaries of information systems are no longer clear. In this interconnected world the purely perimeter-based security model defining zones of trusted entities inside the perimeter and the untrusted external world outside the perimeter no longer serves the needs of new business models. And the combination of complex technology and sophisticated attack methods it is no longer possible to be sure that all system components and actors inside the perimeter can be trusted. The Zero trust approach brings the sophisticated controls from the perimeter to the entire system. The core idea can be expressed with the four words “never trust, always verify”. No system component is by default trusted , and one-time verification is not sufficient – access to a resource must be verified at each connection attempt. Mutual authentication of the communicating parties is in the core of the approach. But does the zero trust approach have unwanted side-effects? The complexity of the system increases when new control layers are built, and system complexity can increase the possibility of configuration errors. Can there be other side-effects as well? The need for trust does not disappear even when the systems are built on the zero trust principles. When studying the zero trust approach the author started thinking what would happen in human interaction and organizational co-operation if they are based on or partly apply the zero trust approach. And the scenarios were quite gloomy. But is this only a nightmare or already at least partly present in our reality? This article describes the zero trust approach and its applicability to technical environments. The second part present scenarios of the impacts which application of zero trust principles could have – or maybe already has - in human communication and organizational relationships.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128391938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Static Vulnerability Analysis Using Intermediate Representations: A Literature Review 使用中间表示的静态脆弱性分析:文献综述
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1154
Adam M Spanier, W. Mahoney
Analysis (SA) in Cybersecurity is a practice aimed at detecting vulnerabilities within the source code of a program. Modern SA applications, though highly sophisticated, lack programming language agnostic generalization, instead requiring codebase specific implementations for each programming language. The manner in which SA is implemented today, though functional, requires significant man hours to develop and maintain, higher costs due to custom applications for each language, and creates inconsistencies in implementation from SA-tool to SA-tool. A source of programming language generalization occurs within compilers. During the compilation process, source code is converted into a grammatically consistent Intermediate Representation (IR) (e.g. LLVM-IR) before being converted to an output format. The grammatical consistencies provided by the IR theoretically allow the same program written in different languages to be analyzed using the same mechanism. By using the IRs of compiled programming languages as the codebase of SA practices, multiple programming languages can be encompassed by a single SA tool. To begin understanding the possibilities the combination of SA and IRs may reveal, this research presents the following outcomes: 1) a systematic literature search, 2) a literature review, and 3) the classification of existing work pertaining to SA practices using IRs. The results of the study indicate that generalized Static Analysis using the LLVM IR is already a common practice in all compilers, but that the extended use of the LLVM IR in Cybersecurity SA practices aimed at finding vulnerabilities in source code remains underdeveloped.
网络安全中的分析(SA)是一种旨在检测程序源代码中的漏洞的实践。现代SA应用程序虽然非常复杂,但缺乏与编程语言无关的泛化,而是需要针对每种编程语言的特定代码库实现。目前实现SA的方式,尽管是功能性的,但需要大量的人力来开发和维护,由于每种语言的定制应用程序,成本更高,并且在从SA工具到SA工具的实现中造成不一致。编程语言泛化的一个来源发生在编译器中。在编译过程中,源代码在转换为输出格式之前被转换为语法一致的中间表示(IR)(例如LLVM-IR)。IR提供的语法一致性理论上允许用不同语言编写的相同程序使用相同的机制进行分析。通过使用已编译编程语言的IRs作为SA实践的代码库,单个SA工具可以包含多种编程语言。为了开始理解SA和IRs结合可能揭示的可能性,本研究提出了以下结果:1)系统的文献检索,2)文献综述,以及3)与使用IRs的SA实践相关的现有工作分类。研究结果表明,使用LLVM IR的广义静态分析已经是所有编译器中的一种常见做法,但在旨在发现源代码漏洞的网络安全SA实践中扩展使用LLVM IR仍然不发达。
{"title":"Static Vulnerability Analysis Using Intermediate Representations: A Literature Review","authors":"Adam M Spanier, W. Mahoney","doi":"10.34190/eccws.22.1.1154","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1154","url":null,"abstract":"Analysis (SA) in Cybersecurity is a practice aimed at detecting vulnerabilities within the source code of a program. Modern SA applications, though highly sophisticated, lack programming language agnostic generalization, instead requiring codebase specific implementations for each programming language. The manner in which SA is implemented today, though functional, requires significant man hours to develop and maintain, higher costs due to custom applications for each language, and creates inconsistencies in implementation from SA-tool to SA-tool. A source of programming language generalization occurs within compilers. During the compilation process, source code is converted into a grammatically consistent Intermediate Representation (IR) (e.g. LLVM-IR) before being converted to an output format. The grammatical consistencies provided by the IR theoretically allow the same program written in different languages to be analyzed using the same mechanism. By using the IRs of compiled programming languages as the codebase of SA practices, multiple programming languages can be encompassed by a single SA tool. To begin understanding the possibilities the combination of SA and IRs may reveal, this research presents the following outcomes: 1) a systematic literature search, 2) a literature review, and 3) the classification of existing work pertaining to SA practices using IRs. The results of the study indicate that generalized Static Analysis using the LLVM IR is already a common practice in all compilers, but that the extended use of the LLVM IR in Cybersecurity SA practices aimed at finding vulnerabilities in source code remains underdeveloped.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124106062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling fine-grained access control in information sharing with structured data formats 在使用结构化数据格式的信息共享中启用细粒度访问控制
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1143
Tatu Niskanen, J. Salonen
The ongoing need for societal and industrial digital transformation requires rapidly expanding networks of interconnected organizations and dictates an increasing role for cybersecurity in information sharing. A typical setup consists of multiple stakeholders working closely together and needing efficient channels for sharing relevant information in a secure manner. This is especially prevalent with complex modern supply chains and critical information infrastructures. They often comprise of numerous co-operating organizations, people and in some cases smart devices having different levels of access to a variety of information. Granular access control plays a vital role when distributing information efficiently between stakeholders without revealing sensitive pieces of data to unwanted third parties. This article presents a novel framework for enabling fine-grained access control to share information efficiently and securely in these situations. Our motivation and use case for the framework originates from the secure sharing of cyber incident information in the maritime logistics industry. We present a novel solution to this problem by developing an information sharing platform and a meta-model, demonstrated using an implementation with structured JSON data formats, while supporting previously researched attribute-based encryption schemes. The proposed framework provides a broader context to the fine-grained data access control challenge in addition to the technical implementation.
社会和工业数字化转型的持续需求需要互联组织网络的快速扩展,并要求网络安全在信息共享中发挥越来越大的作用。典型的设置包括紧密合作的多个涉众,并且需要有效的通道以安全的方式共享相关信息。这在复杂的现代供应链和关键信息基础设施中尤为普遍。它们通常由许多合作组织、人员和在某些情况下具有不同级别访问各种信息的智能设备组成。粒度访问控制在利益相关者之间有效地分发信息而不向不需要的第三方泄露敏感数据时起着至关重要的作用。本文提出了一个新的框架,用于支持细粒度访问控制,以便在这些情况下高效、安全地共享信息。我们对该框架的动机和用例源于海上物流业中网络事件信息的安全共享。我们通过开发信息共享平台和元模型提出了一种新的解决方案,并使用结构化JSON数据格式的实现进行演示,同时支持先前研究的基于属性的加密方案。除了技术实现之外,提议的框架还为细粒度数据访问控制挑战提供了更广泛的上下文。
{"title":"Enabling fine-grained access control in information sharing with structured data formats","authors":"Tatu Niskanen, J. Salonen","doi":"10.34190/eccws.22.1.1143","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1143","url":null,"abstract":"The ongoing need for societal and industrial digital transformation requires rapidly expanding networks of interconnected organizations and dictates an increasing role for cybersecurity in information sharing. A typical setup consists of multiple stakeholders working closely together and needing efficient channels for sharing relevant information in a secure manner. This is especially prevalent with complex modern supply chains and critical information infrastructures. They often comprise of numerous co-operating organizations, people and in some cases smart devices having different levels of access to a variety of information. Granular access control plays a vital role when distributing information efficiently between stakeholders without revealing sensitive pieces of data to unwanted third parties. This article presents a novel framework for enabling fine-grained access control to share information efficiently and securely in these situations. Our motivation and use case for the framework originates from the secure sharing of cyber incident information in the maritime logistics industry. We present a novel solution to this problem by developing an information sharing platform and a meta-model, demonstrated using an implementation with structured JSON data formats, while supporting previously researched attribute-based encryption schemes. The proposed framework provides a broader context to the fine-grained data access control challenge in addition to the technical implementation.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117029160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reith, Russell, and the Robots: AI, Warfare, and Shaping the Debate 瑞思、罗素和机器人:人工智能、战争和塑造辩论
Pub Date : 2022-06-10 DOI: 10.34190/eccws.21.1.510
K. Scott
On December 8th, 2021, Professor Stuart Russell delivered the second of that year’s Reith Lectures, presented under the banner title ‘Living With Artificial Intelligence’. This specific talk dealt with ‘The Future Role of AI in Warfare’, and in this paper I propose a reading of Russell’s address which both summarises and critiques his argument and stance, to determine what, if anything, can be taken from his position as effectively a public philosopher and applied in the realm of modern warfare, where ethical questions are taken from the seminar room and enacted in battlespace. The Reith lectures occupy a unique place in public discourse; given each year by a leading figure in the field under discussion, they help to shape opinion and debate. In considering the role of AI, and in particular its deployment in combat, there is undoubtedly a need for multi- and transdisciplinary thought, but the choice of Russell as the lecturer is not unproblematic. He is undoubtedly an expert in the field of AI, but he has no direct experience of working with the military, and is clearly not a neutral witness. He has been a leading figure in the campaign to ban research into autonomous weapon systems, and was closely involved in the production of Slaughterbots, a short film which presents a nightmare vision of swarming drones as agents of political repression. There are deep and serious questions to be asked about the role of AI in warfare, but Russell’s position that we must stop all research in the field is arguably naïve. Our adversaries will surely not be as punctilious. At the heart of the debate lie complex issues concerning human agency and control (and ‘control’ lies at the etymological root of ‘cyber’); this paper will use Russell’s lecture as a starting point for the consideration of how we might develop an ethical doctrine for the use of AI, resting on the idea of human-machine teaming. It will, in short, argue for a cybernetic solution to the problems of cyber warfare.
2021年12月8日,Stuart Russell教授发表了当年的第二场Reith讲座,主题是“与人工智能一起生活”。这个具体的演讲涉及“人工智能在战争中的未来角色”,在这篇论文中,我建议阅读罗素的演讲,总结和批评他的论点和立场,以确定什么,如果有的话,可以从他作为一个有效的公共哲学家的立场,并应用于现代战争领域,伦理问题是从研讨会的房间里拿走的,并在战场上实施。里思讲座在公共话语中占有独特的地位;每年由该领域的一位领军人物提出,有助于形成观点和辩论。考虑到人工智能的作用,特别是它在战斗中的部署,无疑需要多学科和跨学科的思考,但选择罗素作为讲师并非没有问题。他无疑是人工智能领域的专家,但他没有与军方合作的直接经验,显然不是一个中立的证人。他一直是禁止自主武器系统研究运动的领军人物,并密切参与了《杀戮机器人》(Slaughterbots)的制作,这部短片描绘了一幅噩梦般的景象:成群结队的无人机充当了政治镇压的代理人。关于人工智能在战争中的作用,存在深刻而严肃的问题,但罗素认为我们必须停止该领域的所有研究的立场可以说是naïve。我们的对手肯定不会这么谨小慎微。争论的核心是关于人类代理和控制的复杂问题(“控制”是“cyber”的词源);本文将以罗素的演讲为起点,考虑我们如何在人机合作的基础上,为人工智能的使用制定一套道德准则。简而言之,它将为网络战的问题提出一种控制论解决方案。
{"title":"Reith, Russell, and the Robots: AI, Warfare, and Shaping the Debate","authors":"K. Scott","doi":"10.34190/eccws.21.1.510","DOIUrl":"https://doi.org/10.34190/eccws.21.1.510","url":null,"abstract":"On December 8th, 2021, Professor Stuart Russell delivered the second of that year’s Reith Lectures, presented under the banner title ‘Living With Artificial Intelligence’. This specific talk dealt with ‘The Future Role of AI in Warfare’, and in this paper I propose a reading of Russell’s address which both summarises and critiques his argument and stance, to determine what, if anything, can be taken from his position as effectively a public philosopher and applied in the realm of modern warfare, where ethical questions are taken from the seminar room and enacted in battlespace. The Reith lectures occupy a unique place in public discourse; given each year by a leading figure in the field under discussion, they help to shape opinion and debate. In considering the role of AI, and in particular its deployment in combat, there is undoubtedly a need for multi- and transdisciplinary thought, but the choice of Russell as the lecturer is not unproblematic. He is undoubtedly an expert in the field of AI, but he has no direct experience of working with the military, and is clearly not a neutral witness. He has been a leading figure in the campaign to ban research into autonomous weapon systems, and was closely involved in the production of Slaughterbots, a short film which presents a nightmare vision of swarming drones as agents of political repression. There are deep and serious questions to be asked about the role of AI in warfare, but Russell’s position that we must stop all research in the field is arguably naïve. Our adversaries will surely not be as punctilious. At the heart of the debate lie complex issues concerning human agency and control (and ‘control’ lies at the etymological root of ‘cyber’); this paper will use Russell’s lecture as a starting point for the consideration of how we might develop an ethical doctrine for the use of AI, resting on the idea of human-machine teaming. It will, in short, argue for a cybernetic solution to the problems of cyber warfare.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"325 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124588685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Violence in Twitter Using a Custom Lexicon and NLP 使用自定义词汇和NLP识别Twitter中的暴力行为
Pub Date : 2022-06-08 DOI: 10.34190/eccws.21.1.340
Jonathan Adkins
Information warfare is no longer a denizen purely of the political domain. It is a phenomenon that permeates other domains, especially those of mass communications and cybersecurity. Deepfakes, sock puppets, and microtargeted political advertising on social media are some examples of techniques that have been employed by threat actors to exert influence over consumers of mass media. Social Network Analysis (SNA) is an aggregation of tools and techniques used to research and analyze the nature of relationships between entities. SNA makes use of such tools as text mining, sentiment analysis, and machine learning algorithms to identify and measure aspects of human behavior in certain defined conditions. One area of interest in SNA is the ability to identify and measure levels of strong emotions in groups of people. In particular, we have developed a technique in which the potential for increased violence within a community can be identified and measured using a combination of text mining, sentiment analysis, and graph theory. We have compiled a custom lexicon of terms used commonly in discussions relating to acts of violence. Each term in the lexicon has a numerical weight associated with it, indicating how violent the term is. We will take samples of online community discussions from Twitter and use the R and Python programming languages to cross-reference the samples with our lexicon. The results will be displayed in a Twitter discussion graph where the user nodes are color-coded according to the overall level of violence that is inherent in the Tweet. This methodology will demonstrate which communities within an online social network discussion are more at risk for potentially violent behavior. We assert that when this approach is used in association with other NLP techniques such as word embeddings and sentiment analysis, it will provide cybersecurity and homeland security analysts with actionable threat intelligence.
信息战不再是纯粹的政治领域。这种现象也渗透到其他领域,尤其是大众传播和网络安全领域。深度造假、袜子木偶和社交媒体上的微目标政治广告是威胁行为者用来对大众媒体消费者施加影响的一些技术例子。社会网络分析(SNA)是用于研究和分析实体之间关系本质的工具和技术的集合。SNA使用文本挖掘、情感分析和机器学习算法等工具来识别和测量特定条件下人类行为的各个方面。对SNA感兴趣的一个领域是识别和测量人群中强烈情绪水平的能力。特别是,我们开发了一种技术,可以使用文本挖掘、情感分析和图论的组合来识别和测量社区内暴力增加的可能性。我们编制了一个关于暴力行为的讨论中常用术语的自定义词汇。词典中的每个术语都有一个与之相关的数值权重,表示该术语的暴力程度。我们将从Twitter上获取在线社区讨论的示例,并使用R和Python编程语言将示例与我们的词典交叉引用。结果将显示在Twitter讨论图中,其中用户节点根据Tweet中固有的整体暴力程度进行颜色编码。该方法将展示在线社交网络讨论中的哪些社区更容易出现潜在的暴力行为。我们断言,当这种方法与其他NLP技术(如词嵌入和情感分析)结合使用时,它将为网络安全和国土安全分析师提供可操作的威胁情报。
{"title":"Identification of Violence in Twitter Using a Custom Lexicon and NLP","authors":"Jonathan Adkins","doi":"10.34190/eccws.21.1.340","DOIUrl":"https://doi.org/10.34190/eccws.21.1.340","url":null,"abstract":"Information warfare is no longer a denizen purely of the political domain. It is a phenomenon that permeates other domains, especially those of mass communications and cybersecurity. Deepfakes, sock puppets, and microtargeted political advertising on social media are some examples of techniques that have been employed by threat actors to exert influence over consumers of mass media. Social Network Analysis (SNA) is an aggregation of tools and techniques used to research and analyze the nature of relationships between entities. SNA makes use of such tools as text mining, sentiment analysis, and machine learning algorithms to identify and measure aspects of human behavior in certain defined conditions. One area of interest in SNA is the ability to identify and measure levels of strong emotions in groups of people. In particular, we have developed a technique in which the potential for increased violence within a community can be identified and measured using a combination of text mining, sentiment analysis, and graph theory. We have compiled a custom lexicon of terms used commonly in discussions relating to acts of violence. Each term in the lexicon has a numerical weight associated with it, indicating how violent the term is. We will take samples of online community discussions from Twitter and use the R and Python programming languages to cross-reference the samples with our lexicon. The results will be displayed in a Twitter discussion graph where the user nodes are color-coded according to the overall level of violence that is inherent in the Tweet. This methodology will demonstrate which communities within an online social network discussion are more at risk for potentially violent behavior. We assert that when this approach is used in association with other NLP techniques such as word embeddings and sentiment analysis, it will provide cybersecurity and homeland security analysts with actionable threat intelligence.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116464084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Construction of Hardware Traffic Validators 硬件流量验证器的自动构造
Pub Date : 2022-06-08 DOI: 10.34190/eccws.21.1.200
Stephen Taylor, Jason Dahlstrom, E. Baker, Brandon Guzman
This paper describes a fully automated process that creates a custom hardware traffic validator directly from a formal grammar and deploys it within a specialized network security appliance. The appliance appears as a hidden, all-hardware “bump-in-the-wire” that can be inserted within any network segment; it stores and validates messages on-the-fly, and either forwards or drops individual packets in real-time. Consequently, it serves to disrupt and mitigate stealthy remote attacks that leverage zero-day exploits and persistent implants. Allowed traffic, files, and mission payload formats are specified formally using a standard Look-Ahead, Left-to-Right (LALR) grammar that operates on ASCII and/or binary data. The grammars can be expressed either in Backus-Naur Form (BNF), used by industry standard tools such as Bison, or through state-of-the-art combinators, such as Hammer, under development within the DARPA SafeDocs program. Bison and Hammer compiler tools are used to generate standard shift/reduce parsing tables. These tables are post-processed to improve their compactness and practical viability. The optimized tables are then combined with a generic push-down automaton to form a complete parser. The parser is then automatically transformed into a hardware circuit using High-Level Synthesis (HLS). The result is a composable block of circuitry that can be directly inserted into a generic communications harness embedded within a Field Programmable Gate Array (FPGA) on the network appliance.
本文描述了一个完全自动化的过程,该过程直接从正式语法创建自定义硬件流量验证器,并将其部署到专门的网络安全设备中。该设备看起来像一个隐藏的、全硬件的“插线器”,可以插入任何网络段;它实时存储和验证消息,并实时转发或丢弃单个数据包。因此,它可以破坏和减轻利用零日漏洞和持久植入的隐形远程攻击。允许的流量、文件和任务有效载荷格式使用标准的从左到右(LALR)语法正式指定,该语法对ASCII和/或二进制数据进行操作。语法既可以用巴克斯-瑙尔形式(BNF)表示,这种形式由Bison等行业标准工具使用,也可以通过最先进的组合器表示,例如DARPA SafeDocs项目正在开发的Hammer。Bison和Hammer编译器工具用于生成标准的shift/reduce解析表。这些表经过后处理,以提高其紧凑性和实际可行性。然后将优化的表与一般的下推自动机结合起来,形成一个完整的解析器。然后使用高级合成(High-Level Synthesis, HLS)将解析器自动转换为硬件电路。结果是一个可组合的电路块,可以直接插入到嵌入在网络设备上的现场可编程门阵列(FPGA)中的通用通信线束中。
{"title":"Automatic Construction of Hardware Traffic Validators","authors":"Stephen Taylor, Jason Dahlstrom, E. Baker, Brandon Guzman","doi":"10.34190/eccws.21.1.200","DOIUrl":"https://doi.org/10.34190/eccws.21.1.200","url":null,"abstract":"This paper describes a fully automated process that creates a custom hardware traffic validator directly from a formal grammar and deploys it within a specialized network security appliance. The appliance appears as a hidden, all-hardware “bump-in-the-wire” that can be inserted within any network segment; it stores and validates messages on-the-fly, and either forwards or drops individual packets in real-time. Consequently, it serves to disrupt and mitigate stealthy remote attacks that leverage zero-day exploits and persistent implants. Allowed traffic, files, and mission payload formats are specified formally using a standard Look-Ahead, Left-to-Right (LALR) grammar that operates on ASCII and/or binary data. The grammars can be expressed either in Backus-Naur Form (BNF), used by industry standard tools such as Bison, or through state-of-the-art combinators, such as Hammer, under development within the DARPA SafeDocs program. Bison and Hammer compiler tools are used to generate standard shift/reduce parsing tables. These tables are post-processed to improve their compactness and practical viability. The optimized tables are then combined with a generic push-down automaton to form a complete parser. The parser is then automatically transformed into a hardware circuit using High-Level Synthesis (HLS). The result is a composable block of circuitry that can be directly inserted into a generic communications harness embedded within a Field Programmable Gate Array (FPGA) on the network appliance.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128299519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DRAM-based Physically Unclonable Functions and the Need for Proper Evaluation 基于dram的物理不可克隆功能及其合理评估的必要性
Pub Date : 2022-06-08 DOI: 10.34190/eccws.21.1.404
C. Lipps, Pascal Ahr, H. Schotten
Dynamic Random-Access Memory (DRAM)-based Physically Unclonable Functions (PUFs) are a part of the Physical Layer Security (PhySec) domain. Those electrical PUFs are memory based and exhibit a high availability, Shannon Entropy, low energy consumption and high amount of Challenge Response Pairs (CRPs). Because of those properties, the DRAM PUF is a promising approach for security applications in the Industrial Internet of Things (IIoT) context as well as securing the Sixth-Generation (6G) Wireless Systems and edge computing. DRAM, with its most common one-Transistor one-Capacitor (1T1C) architecture, and as a volatile memory is embedded in almost every modern computing unit. Regarding the PUF security applications, four main types of applications are currently distinguished in the scientific community: Retention Error, Row Hammer, Startup and Latency PUFs. Thereby these differ in their procedure in how responses are generated as well as by the physical mechanisms. Each of them with varying properties in terms of availability, reliability, uniqueness and uniformity. To examine this, and to obtain comparable results, this work proposes to compare the four different DRAM-PUF types i) with the same metrics of evaluation and ii) implemented on the same DRAM cells. This represents both the difference with regard to the work done in the literature and the added value of this work presented. As far as known, there is no work to date that performs the intended evaluations using the same evaluation platform under the identical conditions. However, this is required for comparable results. This consistent comparison is ensured by a self-developed and implemented evaluation platform, which is accordingly equipped with a significant number of DRAMs. By an appropriate high volume of measurements, a corresponding resolution will be given. Monitoring the environmental conditions prevents from wrong interpretations caused by environmental influences but also provides useful context information.  Furthermore, a detailed technical and physical background will be described. The results of this approach will assist by the consideration of which DRAM-PUF is appropriate in which (environmental) conditions and thereby provide a guideline for practitioners.  
基于动态随机存取存储器(DRAM)的物理不可克隆功能(puf)是物理层安全(PhySec)领域的一部分。这些电puf是基于内存的,具有高可用性、香农熵、低能耗和大量的挑战响应对(CRPs)。由于这些特性,DRAM PUF对于工业物联网(IIoT)环境中的安全应用以及第六代(6G)无线系统和边缘计算的安全应用是一种很有前途的方法。DRAM,以其最常见的一晶体管一电容(1T1C)架构,作为易失性存储器,几乎嵌入到每个现代计算单元中。关于PUF安全应用,目前科学界主要区分四种类型的应用:保留错误、行锤、启动和延迟PUF。因此,这些反应产生的过程和物理机制是不同的。它们中的每一个在可用性、可靠性、唯一性和一致性方面都具有不同的属性。为了检验这一点,并获得可比较的结果,本工作建议比较四种不同的DRAM- puf类型i)具有相同的评估指标,ii)在相同的DRAM单元上实现。这既代表了文献中所做工作的差异,也代表了本工作所呈现的附加价值。据我们所知,到目前为止,还没有工作在相同的条件下使用相同的评估平台执行预期的评估。然而,这是比较结果所必需的。这种一致的比较是由一个自行开发和实施的评估平台保证的,该平台相应地配备了大量的dram。通过适当的大量测量,将得到相应的分辨率。监测环境条件可以防止由于环境影响造成的错误解释,而且还提供有用的上下文信息。此外,详细的技术和物理背景将被描述。这种方法的结果将有助于考虑哪种(环境)条件下哪种ram - puf是合适的,从而为从业者提供指导。
{"title":"DRAM-based Physically Unclonable Functions and the Need for Proper Evaluation","authors":"C. Lipps, Pascal Ahr, H. Schotten","doi":"10.34190/eccws.21.1.404","DOIUrl":"https://doi.org/10.34190/eccws.21.1.404","url":null,"abstract":"Dynamic Random-Access Memory (DRAM)-based Physically Unclonable Functions (PUFs) are a part of the Physical Layer Security (PhySec) domain. Those electrical PUFs are memory based and exhibit a high availability, Shannon Entropy, low energy consumption and high amount of Challenge Response Pairs (CRPs). Because of those properties, the DRAM PUF is a promising approach for security applications in the Industrial Internet of Things (IIoT) context as well as securing the Sixth-Generation (6G) Wireless Systems and edge computing. \u0000DRAM, with its most common one-Transistor one-Capacitor (1T1C) architecture, and as a volatile memory is embedded in almost every modern computing unit. Regarding the PUF security applications, four main types of applications are currently distinguished in the scientific community: Retention Error, Row Hammer, Startup and Latency PUFs. Thereby these differ in their procedure in how responses are generated as well as by the physical mechanisms. Each of them with varying properties in terms of availability, reliability, uniqueness and uniformity. \u0000To examine this, and to obtain comparable results, this work proposes to compare the four different DRAM-PUF types i) with the same metrics of evaluation and ii) implemented on the same DRAM cells. This represents both the difference with regard to the work done in the literature and the added value of this work presented. As far as known, there is no work to date that performs the intended evaluations using the same evaluation platform under the identical conditions. However, this is required for comparable results. \u0000This consistent comparison is ensured by a self-developed and implemented evaluation platform, which is accordingly equipped with a significant number of DRAMs. By an appropriate high volume of measurements, a corresponding resolution will be given. Monitoring the environmental conditions prevents from wrong interpretations caused by environmental influences but also provides useful context information.  Furthermore, a detailed technical and physical background will be described. The results of this approach will assist by the consideration of which DRAM-PUF is appropriate in which (environmental) conditions and thereby provide a guideline for practitioners.  ","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123985523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Security Norms: Trust and Cooperation 网络安全规范:信任与合作
Pub Date : 2022-06-08 DOI: 10.34190/eccws.21.1.498
Allison Wylde
As cyber crime becomes ever more sophisticated and a significant asymmetric threat, the need for effective cyber security is of vital importance. One important cyber security response is through cyber norms. At the same time, calls for multi-sector and multi-domain trust and cooperation are widespread. Yet research on the nature of trust and cooperation in cyber security norms appears to be underdeveloped. Key questions remain concerning the emergence and nature of trust and cooperation in norms. In addressing this gap, the article first considers how we can understand trust and cooperation in cyber norms through leveraging well-established theory from management research on trust building. Next, the paper examines the SolarWinds breach, as an example, to evaluate norms, trust and cooperation. The paper then applies principles from prominent trust-building theory to examine the antecedents, processes of outputs involved in building trust and cooperation. The contribution of this work presents a foundational conceptual framework, to allow the dynamics of norms, trust, and cooperation in managing cyber crime incidents to be studied. In doing so, the literature on examining trust and cooperation in norms is extended. Other researchers’ interest is encouraged as is an agenda for further research on norms, trust, and cooperation to support cyber security management. Implications may help the cyber security community as they construct and manage norms, trust, and cooperation.
随着网络犯罪变得越来越复杂和严重的不对称威胁,有效的网络安全需求至关重要。一个重要的网络安全应对措施是通过网络规范。同时,多部门、多领域的信任与合作呼声日益高涨。然而,对网络安全规范中信任与合作本质的研究似乎并不发达。关于规范中信任与合作的出现和性质的关键问题仍然存在。为了解决这一差距,本文首先考虑了我们如何通过利用管理研究中关于信任建立的成熟理论来理解网络规范中的信任与合作。接下来,本文以太阳风事件为例,对规范、信任与合作进行了评估。然后,本文运用著名的信任建立理论的原则来研究建立信任和合作所涉及的前因由、过程和产出。这项工作的贡献提出了一个基本的概念框架,允许在管理网络犯罪事件的规范,信任和合作的动态进行研究。在此过程中,研究规范中的信任与合作的文献得到了扩展。鼓励其他研究人员的兴趣,以及进一步研究规范,信任和合作以支持网络安全管理的议程。在构建和管理规范、信任与合作的过程中,其影响可能有助于网络安全界。
{"title":"Cyber Security Norms: Trust and Cooperation","authors":"Allison Wylde","doi":"10.34190/eccws.21.1.498","DOIUrl":"https://doi.org/10.34190/eccws.21.1.498","url":null,"abstract":"As cyber crime becomes ever more sophisticated and a significant asymmetric threat, the need for effective cyber security is of vital importance. One important cyber security response is through cyber norms. At the same time, calls for multi-sector and multi-domain trust and cooperation are widespread. Yet research on the nature of trust and cooperation in cyber security norms appears to be underdeveloped. Key questions remain concerning the emergence and nature of trust and cooperation in norms. In addressing this gap, the article first considers how we can understand trust and cooperation in cyber norms through leveraging well-established theory from management research on trust building. Next, the paper examines the SolarWinds breach, as an example, to evaluate norms, trust and cooperation. The paper then applies principles from prominent trust-building theory to examine the antecedents, processes of outputs involved in building trust and cooperation. The contribution of this work presents a foundational conceptual framework, to allow the dynamics of norms, trust, and cooperation in managing cyber crime incidents to be studied. In doing so, the literature on examining trust and cooperation in norms is extended. Other researchers’ interest is encouraged as is an agenda for further research on norms, trust, and cooperation to support cyber security management. Implications may help the cyber security community as they construct and manage norms, trust, and cooperation.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"333 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113985918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Siamese Neural Network and Machine Learning for DGA Classification 用于DGA分类的暹罗神经网络和机器学习
Pub Date : 2022-06-08 DOI: 10.34190/eccws.21.1.205
L. Segurola, Telmo Egüés, Francesco Zola, Raul Orduna
Domain Generation Algorithms (DGA) are systems used to create immediate multiple and varying domain names. Such “artificial” domains can be then used for siting command and control servers which in turn oversee recruiting/infecting devices, and finally turning them into new resources to be exploited. In this sense, identifying DGA domain names can be crucial, to avoid cyberattacks like Phishing, Spam sending, Bitcoin mining, and many other. Usually, domain names generated by DGAs, are comprised by illegible character strings, but new “intelligent” DGAs tend to generate names using combination of words in dictionaries making its detection a challenging task. For this reason, in this work, we propose to address this problem using a combination of Machine Learning algorithms for improving the classification of DGAs domains. In particular, we propose to combine Siamese Neural Networks and traditional supervised Machine Learning algorithms in order to expand the input domain into separable n-dimensional data points and then achieve the domain classification. The proposed approach can be separated into 3 phases. In a first phase, domain names are encoded, by a one-hot encoder and a variation of this, named probabilistic one-hot encoder, which are implemented separately. Then, in the second phase, Long Short-Term Memory and Convolutional Siamese embedders are tested and compared. In particular, the first one is combined with the one-hot, while the Convolution algorithm is applied with the probabilistic one-hot encoded data. In the final step, five Machine Learning algorithms are tested using the two ways embedded data. Both embedder approaches reach very high results in terms of F1-score and Accuracy (about 91%) depending on the implemented classifier. The promising results obtained by the application of the proposed method shows that it is possible to perform DGA domain classification uniquely over the domain names, without considering external information such as DNS packets features.
域名生成算法(Domain Generation Algorithms, DGA)是一种用于即时创建多个不同域名的系统。这样的“人工”域可以用来定位命令和控制服务器,这些服务器反过来监督招募/感染设备,并最终将它们转化为可供利用的新资源。从这个意义上说,识别DGA域名对于避免网络攻击(如网络钓鱼、垃圾邮件发送、比特币挖矿等)至关重要。通常,由DGAs生成的域名由难以辨认的字符串组成,但新的“智能”DGAs倾向于使用字典中的单词组合来生成名称,这使得其检测成为一项具有挑战性的任务。因此,在这项工作中,我们建议使用机器学习算法的组合来解决这个问题,以改进DGAs域的分类。特别地,我们提出将Siamese神经网络与传统的监督机器学习算法相结合,将输入域扩展为可分离的n维数据点,从而实现域分类。建议的方法可分为三个阶段。在第一阶段,域名被编码,由一个单热编码器和它的一个变体,称为概率单热编码器,分别实现。然后,在第二阶段,对长短期记忆和卷积暹罗嵌入器进行了测试和比较。其中,前者与1 -hot相结合,而卷积算法则应用于概率1 -hot编码数据。在最后一步中,使用两种嵌入数据的方式测试了五种机器学习算法。两种嵌入器方法在f1得分和准确率(约91%)方面都达到了非常高的结果,这取决于实现的分类器。应用该方法获得的良好结果表明,在不考虑DNS报文特征等外部信息的情况下,可以对域名进行唯一的DGA域分类。
{"title":"Siamese Neural Network and Machine Learning for DGA Classification","authors":"L. Segurola, Telmo Egüés, Francesco Zola, Raul Orduna","doi":"10.34190/eccws.21.1.205","DOIUrl":"https://doi.org/10.34190/eccws.21.1.205","url":null,"abstract":"Domain Generation Algorithms (DGA) are systems used to create immediate multiple and varying domain names. Such “artificial” domains can be then used for siting command and control servers which in turn oversee recruiting/infecting devices, and finally turning them into new resources to be exploited. In this sense, identifying DGA domain names can be crucial, to avoid cyberattacks like Phishing, Spam sending, Bitcoin mining, and many other. Usually, domain names generated by DGAs, are comprised by illegible character strings, but new “intelligent” DGAs tend to generate names using combination of words in dictionaries making its detection a challenging task. For this reason, in this work, we propose to address this problem using a combination of Machine Learning algorithms for improving the classification of DGAs domains. In particular, we propose to combine Siamese Neural Networks and traditional supervised Machine Learning algorithms in order to expand the input domain into separable n-dimensional data points and then achieve the domain classification. The proposed approach can be separated into 3 phases. In a first phase, domain names are encoded, by a one-hot encoder and a variation of this, named probabilistic one-hot encoder, which are implemented separately. Then, in the second phase, Long Short-Term Memory and Convolutional Siamese embedders are tested and compared. In particular, the first one is combined with the one-hot, while the Convolution algorithm is applied with the probabilistic one-hot encoded data. In the final step, five Machine Learning algorithms are tested using the two ways embedded data. Both embedder approaches reach very high results in terms of F1-score and Accuracy (about 91%) depending on the implemented classifier. The promising results obtained by the application of the proposed method shows that it is possible to perform DGA domain classification uniquely over the domain names, without considering external information such as DNS packets features.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128901678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
European Conference on Cyber Warfare and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1