首页 > 最新文献

2017 International Conference on Cyber Conflict (CyCon U.S.)最新文献

英文 中文
A timing-based covert channel for SCADA networks 基于时序的SCADA网络隐蔽信道
Pub Date : 2017-11-01 DOI: 10.1109/CYCONUS.2017.8167507
A. Lemay, S. Knight
Industrial Control Systems (ICS) networks are an increasingly attractive for attackers. The case of 2015 Ukraine cyber attack where hackers abused the ICS system to create a blackout is a good illustration of this interest. However, to achieve physical effects, it is necessary for attackers to embed themselves deep within the target network. So, attackers must protect this investment by using covert techniques to avoid detection by defenders. This paper explores the problem of highly covert long-lived command and control channels to gain insight into probable evolution paths for attackers in response to increasing defensive capabilities. In particular, it presents a timing-based covert channel for the Modbus using interference. An implementation of the channel using network man-in-the-middle to modulate timing is built as a proof-of-concept of the approach. A performance analysis of the implementation shows that the implementation performs as low bandwidth, but highly covert command and control channel. Furthermore, an analysis of packet captures from a real production network show that the approach would be likely to work in a production environment.
工业控制系统(ICS)网络对攻击者的吸引力越来越大。2015年乌克兰网络攻击事件就是一个很好的例子,黑客利用ICS系统造成了停电。然而,为了达到物理效果,攻击者必须将自己嵌入目标网络的深处。因此,攻击者必须通过使用隐蔽技术来保护这些投资,以避免被防御者发现。本文探讨了高度隐蔽的长寿命命令和控制通道的问题,以深入了解攻击者应对日益增强的防御能力的可能进化路径。特别地,提出了一种利用干扰的基于时序的Modbus隐蔽信道。建立了一个使用网络中间人调制时序的信道实现,作为该方法的概念验证。对该实现的性能分析表明,该实现具有低带宽,但高度隐蔽的命令和控制通道。此外,对来自真实生产网络的数据包捕获的分析表明,该方法可能在生产环境中工作。
{"title":"A timing-based covert channel for SCADA networks","authors":"A. Lemay, S. Knight","doi":"10.1109/CYCONUS.2017.8167507","DOIUrl":"https://doi.org/10.1109/CYCONUS.2017.8167507","url":null,"abstract":"Industrial Control Systems (ICS) networks are an increasingly attractive for attackers. The case of 2015 Ukraine cyber attack where hackers abused the ICS system to create a blackout is a good illustration of this interest. However, to achieve physical effects, it is necessary for attackers to embed themselves deep within the target network. So, attackers must protect this investment by using covert techniques to avoid detection by defenders. This paper explores the problem of highly covert long-lived command and control channels to gain insight into probable evolution paths for attackers in response to increasing defensive capabilities. In particular, it presents a timing-based covert channel for the Modbus using interference. An implementation of the channel using network man-in-the-middle to modulate timing is built as a proof-of-concept of the approach. A performance analysis of the implementation shows that the implementation performs as low bandwidth, but highly covert command and control channel. Furthermore, an analysis of packet captures from a real production network show that the approach would be likely to work in a production environment.","PeriodicalId":259012,"journal":{"name":"2017 International Conference on Cyber Conflict (CyCon U.S.)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114934190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Take the rein of cyber deterrence 以网络威慑为例
Pub Date : 2017-11-01 DOI: 10.1109/CYCONUS.2017.8167510
Jim Q. Chen
Deterrence is badly needed in the cyber domain but it is hard to be achieved. Why is conventional deterrence not working effectively in the cyber domain? What specific characteristics should be considered when deterrence strategies are developed in this man-made domain? These are the questions that this paper intends to address. The research conducted helps to reveal what cyber deterrence can do and what it cannot do so that focus can be put on the enhancement of what it can do. To include varied perspectives, literature review is conducted. Some research works are specifically examined. Based on these studies, this research proposes a holistic approach in cyber deterrence that is empowered by artificial intelligence and machine learning. This approach is capable of making sudden, dynamic, stealthy, and random changes initiated by different contexts. It is able to catch attackers by surprise. The surprising and changing impact inflicts a cost on attackers and makes them to re-calculate the benefits that they might gain through further attacks, thus discouraging or defeating adversaries both mentally and virtually, and eventually controlling escalation of cyber conflicts.
在网络领域,威慑是迫切需要的,但很难实现。为什么传统威慑在网络领域不起作用?在这一人造领域制定威慑战略时,应考虑哪些具体特征?这些都是本文要探讨的问题。所进行的研究有助于揭示网络威慑可以做什么和不能做什么,以便将重点放在增强其可以做什么上。为了纳入不同的观点,我们进行了文献综述。一些研究工作是专门审查。在这些研究的基础上,本研究提出了一种基于人工智能和机器学习的网络威慑整体方法。这种方法能够做出突然的、动态的、隐秘的和随机的变化,这些变化是由不同的环境引发的。它能让攻击者措手不及。这种令人惊讶和不断变化的影响使攻击者付出代价,使他们重新计算通过进一步攻击可能获得的利益,从而在精神上和虚拟上打击或击败对手,并最终控制网络冲突的升级。
{"title":"Take the rein of cyber deterrence","authors":"Jim Q. Chen","doi":"10.1109/CYCONUS.2017.8167510","DOIUrl":"https://doi.org/10.1109/CYCONUS.2017.8167510","url":null,"abstract":"Deterrence is badly needed in the cyber domain but it is hard to be achieved. Why is conventional deterrence not working effectively in the cyber domain? What specific characteristics should be considered when deterrence strategies are developed in this man-made domain? These are the questions that this paper intends to address. The research conducted helps to reveal what cyber deterrence can do and what it cannot do so that focus can be put on the enhancement of what it can do. To include varied perspectives, literature review is conducted. Some research works are specifically examined. Based on these studies, this research proposes a holistic approach in cyber deterrence that is empowered by artificial intelligence and machine learning. This approach is capable of making sudden, dynamic, stealthy, and random changes initiated by different contexts. It is able to catch attackers by surprise. The surprising and changing impact inflicts a cost on attackers and makes them to re-calculate the benefits that they might gain through further attacks, thus discouraging or defeating adversaries both mentally and virtually, and eventually controlling escalation of cyber conflicts.","PeriodicalId":259012,"journal":{"name":"2017 International Conference on Cyber Conflict (CyCon U.S.)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130102317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quantum technologies, U.S.-China strategic competition, and future dynamics of cyber stability 量子技术、美中战略竞争和网络稳定的未来动态
Pub Date : 2017-11-01 DOI: 10.1109/CYCONUS.2017.8167502
Elsa B. Kania, J. Costello
The current realities of the cyber domain could be radically disrupted by the advent of quantum communications and quantum computing. The consequent challenges for future cyber security and strategy require a nuanced analysis of these technologies and their likely employment by major powers. The employment of quantum cryptography can create quantum communications systems that are theoretically unhackable. Within the foreseeable future, quantum computing will be powerful enough to overcome most of today's advanced encryption techniques, rendering the majority of existing commercial, government, and military systems unprecedentedly vulnerable. These quantum technologies could respectively tend to advantage defense and offense in the cyber domain. While the “shield” enabled by quantum communications would contribute to technological deterrence through denial, the asymmetries of vulnerability that might result could potentially undermine military cyber stability, while exacerbating the risks of misperception through complicating intelligence collection. In the more distant future, the advent of quantum computing will enable unique offensive power that could leapfrog existing cyber capabilities. The strategic impact of these disruptive technologies will depend upon the approaches of great powers, particularly the U.S. and China, which have become leaders in this technological domain.
量子通信和量子计算的出现可能会彻底颠覆网络领域的现状。未来网络安全和战略面临的挑战需要对这些技术及其可能被大国使用的情况进行细致入微的分析。量子密码学的应用可以创建理论上不可破解的量子通信系统。在可预见的未来,量子计算将强大到足以克服当今大多数先进的加密技术,使大多数现有的商业、政府和军事系统变得前所未有的脆弱。在网络领域,这些量子技术可能分别有利于防御和进攻。虽然由量子通信实现的“盾牌”将有助于通过拒拒实现技术威慑,但可能导致的脆弱性不对称可能会破坏军事网络稳定,同时通过使情报收集复杂化而加剧误解的风险。在更遥远的未来,量子计算的出现将使独特的进攻力量能够超越现有的网络能力。这些颠覆性技术的战略影响将取决于大国的做法,尤其是美国和中国,它们已经成为这一技术领域的领导者。
{"title":"Quantum technologies, U.S.-China strategic competition, and future dynamics of cyber stability","authors":"Elsa B. Kania, J. Costello","doi":"10.1109/CYCONUS.2017.8167502","DOIUrl":"https://doi.org/10.1109/CYCONUS.2017.8167502","url":null,"abstract":"The current realities of the cyber domain could be radically disrupted by the advent of quantum communications and quantum computing. The consequent challenges for future cyber security and strategy require a nuanced analysis of these technologies and their likely employment by major powers. The employment of quantum cryptography can create quantum communications systems that are theoretically unhackable. Within the foreseeable future, quantum computing will be powerful enough to overcome most of today's advanced encryption techniques, rendering the majority of existing commercial, government, and military systems unprecedentedly vulnerable. These quantum technologies could respectively tend to advantage defense and offense in the cyber domain. While the “shield” enabled by quantum communications would contribute to technological deterrence through denial, the asymmetries of vulnerability that might result could potentially undermine military cyber stability, while exacerbating the risks of misperception through complicating intelligence collection. In the more distant future, the advent of quantum computing will enable unique offensive power that could leapfrog existing cyber capabilities. The strategic impact of these disruptive technologies will depend upon the approaches of great powers, particularly the U.S. and China, which have become leaders in this technological domain.","PeriodicalId":259012,"journal":{"name":"2017 International Conference on Cyber Conflict (CyCon U.S.)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114763605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
What might be predominant form of cyber conflict? 网络冲突的主要形式是什么?
Pub Date : 2017-11-01 DOI: 10.1109/CYCONUS.2017.8167511
Jason Healey
After nearly fifteen years of war, the US military is pretty sure that future conflicts won't look like the past.
经过近15年的战争,美国军方非常确定,未来的冲突不会像过去那样。
{"title":"What might be predominant form of cyber conflict?","authors":"Jason Healey","doi":"10.1109/CYCONUS.2017.8167511","DOIUrl":"https://doi.org/10.1109/CYCONUS.2017.8167511","url":null,"abstract":"After nearly fifteen years of war, the US military is pretty sure that future conflicts won't look like the past.","PeriodicalId":259012,"journal":{"name":"2017 International Conference on Cyber Conflict (CyCon U.S.)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131944019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Establishing volunteer US cyber defense units: A holistic approach 建立志愿美国网络防御单位:一个整体的方法
Pub Date : 2017-11-01 DOI: 10.1109/CYCONUS.2017.8167512
Monica M. Ruiz
The global use of the cyber domain has heightened speed, agility, and interconnectivity within our societies. Consequently, it has also increased threats that share the same characteristics. No longer is reality linear, as two points in time and individuals can connect from varied locations almost instantly, shifting the balance of how we approach traditional security challenges. This paper argues for the creation of volunteer United States (US) Cyber Defense Units (US CDU) at the state-level, similar to the Estonian Defence League's Cyber Defence Unit (EDL CDU). The goal in its establishment being to achieve a whole-of-society approach by creating the opportunity for individuals across sectors to volunteer in the joint cause of protecting US cyberspace. Voluntarism has worked before (e.g. US Minutemen, US National Guard, Civil Air Patrol) and it can certainly work again — this time, for the cyber domain. This paper provides background on prior US cyber defense initiatives and delves into the EDL CDU to draw possible theoretical structures and lessons for the formation and integration of the proposed US CDU. It also examines ongoing developments with the US Cyber Mission Force (CMF) to compare efforts. The paper includes primary and secondary source material from academia, government, and private sectors in both the US and Estonia. It analyzes ongoing efforts for cyber defense and reviews academic literature and research on the topics discussed.
网络领域的全球使用提高了我们社会的速度、敏捷性和互联性。因此,它也增加了具有相同特征的威胁。现实不再是线性的,因为两个时间点和个人几乎可以立即从不同的地点联系起来,改变了我们如何应对传统安全挑战的平衡。本文主张在州一级建立志愿的美国网络防御单位(US CDU),类似于爱沙尼亚国防联盟的网络防御单位(EDL CDU)。其建立的目标是通过为各个部门的个人创造机会,自愿参与保护美国网络空间的共同事业,实现全社会的做法。唯意志主义以前曾起过作用(如美国民兵、美国国民警卫队、民用空中巡逻队),当然它也能再次发挥作用——这次是在网络领域。本文提供了美国之前的网络防御计划的背景,并深入研究了EDL CDU,为拟议的美国CDU的形成和整合提供了可能的理论结构和经验教训。它还审查了与美国网络任务部队(CMF)正在进行的发展,以比较努力。该论文包括来自学术界,政府和私营部门在美国和爱沙尼亚的主要和次要源材料。它分析了正在进行的网络防御工作,并回顾了所讨论主题的学术文献和研究。
{"title":"Establishing volunteer US cyber defense units: A holistic approach","authors":"Monica M. Ruiz","doi":"10.1109/CYCONUS.2017.8167512","DOIUrl":"https://doi.org/10.1109/CYCONUS.2017.8167512","url":null,"abstract":"The global use of the cyber domain has heightened speed, agility, and interconnectivity within our societies. Consequently, it has also increased threats that share the same characteristics. No longer is reality linear, as two points in time and individuals can connect from varied locations almost instantly, shifting the balance of how we approach traditional security challenges. This paper argues for the creation of volunteer United States (US) Cyber Defense Units (US CDU) at the state-level, similar to the Estonian Defence League's Cyber Defence Unit (EDL CDU). The goal in its establishment being to achieve a whole-of-society approach by creating the opportunity for individuals across sectors to volunteer in the joint cause of protecting US cyberspace. Voluntarism has worked before (e.g. US Minutemen, US National Guard, Civil Air Patrol) and it can certainly work again — this time, for the cyber domain. This paper provides background on prior US cyber defense initiatives and delves into the EDL CDU to draw possible theoretical structures and lessons for the formation and integration of the proposed US CDU. It also examines ongoing developments with the US Cyber Mission Force (CMF) to compare efforts. The paper includes primary and secondary source material from academia, government, and private sectors in both the US and Estonia. It analyzes ongoing efforts for cyber defense and reviews academic literature and research on the topics discussed.","PeriodicalId":259012,"journal":{"name":"2017 International Conference on Cyber Conflict (CyCon U.S.)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126246276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 International Conference on Cyber Conflict (CyCon U.S.)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1