首页 > 最新文献

SHCIS '17最新文献

英文 中文
Interactive Visualization of Recommender Systems Data 推荐系统数据的交互式可视化
Pub Date : 2017-06-19 DOI: 10.1145/3099012.3099014
Christian Richthammer, Johannes Sänger, G. Pernul
Recommender systems provide a valuable mechanism to address the information overload problem by reducing a data set to the items that may be interesting for a particular user. While the quality of recommendations has notably improved in the recent years, the complex algorithms in use lead to high non-transparency for the end user. We propose the usage of interactive visualizations for presenting recommendations. By involving the user in the information reduction process, the quality of recommendations could be enhanced whilst keeping the system's transparency. This work gives first insights by analyzing recommender systems data and matching them to suitable visualization and interaction techniques. The findings are illustrated by means of an example scenario based on a typical real-world setting.
推荐系统提供了一种有价值的机制,通过将数据集减少到特定用户可能感兴趣的项目来解决信息过载问题。虽然近年来推荐的质量有了显著提高,但使用的复杂算法导致最终用户的高度不透明。我们建议使用交互式可视化来呈现建议。通过让用户参与信息缩减过程,可以在保持系统透明度的同时提高推荐的质量。这项工作通过分析推荐系统数据并将其与合适的可视化和交互技术相匹配,提供了第一个见解。研究结果通过基于典型现实世界设置的示例场景来说明。
{"title":"Interactive Visualization of Recommender Systems Data","authors":"Christian Richthammer, Johannes Sänger, G. Pernul","doi":"10.1145/3099012.3099014","DOIUrl":"https://doi.org/10.1145/3099012.3099014","url":null,"abstract":"Recommender systems provide a valuable mechanism to address the information overload problem by reducing a data set to the items that may be interesting for a particular user. While the quality of recommendations has notably improved in the recent years, the complex algorithms in use lead to high non-transparency for the end user. We propose the usage of interactive visualizations for presenting recommendations. By involving the user in the information reduction process, the quality of recommendations could be enhanced whilst keeping the system's transparency. This work gives first insights by analyzing recommender systems data and matching them to suitable visualization and interaction techniques. The findings are illustrated by means of an example scenario based on a typical real-world setting.","PeriodicalId":269698,"journal":{"name":"SHCIS '17","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132442171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Playing a Multi-objective Spot-checking Game in Public Transportation Systems 在公共交通系统中玩多目标抽查游戏
Pub Date : 2017-06-19 DOI: 10.1145/3099012.3099019
Ali Alshawish, Mohamed Amine Abid, S. Rass, H. Meer
Public transportation systems represent an essential sector of any nation's critical infrastructure. Hence, continuity of their services is deemed important and with a high priority to the nations. Concerns over risks like terrorism, criminal offenses, and business revenue loss impose the need for enhancing situation awareness in these systems. However, practices, such as conducting random patrols or regular spot-checks on passengers to prevent or deter potential violations, are strictly limited by the number of available resources (e.g. security staff or fare inspectors) and by the ability of potential opponents (e.g. criminals, or fare evaders) to predict or observe the inspectors' presence patterns. Casting the interactions between these competitive entities (inspectors/security officials and criminals/fare dodgers) into a game-theoretic model will enable involved system operators to 1) find optimal cost-effective (or multi-goal) human resource allocation or spot-check schedules, 2) capture and treat uncertainty due to imperfectness of information, 3) integrate measurements from heterogeneous natures (e.g. statistics, expert opinions, or simulation results). This work applies a game-theoretical model that uses random probability-distribution-valued payoffs to allow playing spot-checking games with diverging actions' outcomes as well as avoiding information loss due to combining several measurements into one representative (e.g. average).
公共交通系统是任何国家重要基础设施的重要组成部分。因此,他们的服务的连续性被认为是重要的,是各国的高度优先事项。对恐怖主义、刑事犯罪和商业收入损失等风险的担忧,要求加强这些系统的态势感知能力。然而,诸如对乘客进行随机巡逻或定期抽查以防止或制止潜在违规行为的做法,受到可用资源(例如保安人员或检票员)的数量以及潜在对手(例如罪犯或逃票者)预测或观察检票员存在模式的能力的严格限制。将这些竞争实体(检查员/安全官员和罪犯/逃票者)之间的相互作用纳入博弈论模型将使相关系统操作员能够1)找到最优的成本效益(或多目标)人力资源分配或抽查计划,2)捕获和处理由于信息不完善而产生的不确定性,3)整合异构性质的测量(例如统计数据、专家意见或模拟结果)。这项工作应用了一个博弈论模型,该模型使用随机的概率分布值回报,允许进行具有不同行动结果的抽查游戏,并避免由于将多个测量值组合到一个代表(例如平均值)中而导致的信息丢失。
{"title":"Playing a Multi-objective Spot-checking Game in Public Transportation Systems","authors":"Ali Alshawish, Mohamed Amine Abid, S. Rass, H. Meer","doi":"10.1145/3099012.3099019","DOIUrl":"https://doi.org/10.1145/3099012.3099019","url":null,"abstract":"Public transportation systems represent an essential sector of any nation's critical infrastructure. Hence, continuity of their services is deemed important and with a high priority to the nations. Concerns over risks like terrorism, criminal offenses, and business revenue loss impose the need for enhancing situation awareness in these systems. However, practices, such as conducting random patrols or regular spot-checks on passengers to prevent or deter potential violations, are strictly limited by the number of available resources (e.g. security staff or fare inspectors) and by the ability of potential opponents (e.g. criminals, or fare evaders) to predict or observe the inspectors' presence patterns. Casting the interactions between these competitive entities (inspectors/security officials and criminals/fare dodgers) into a game-theoretic model will enable involved system operators to 1) find optimal cost-effective (or multi-goal) human resource allocation or spot-check schedules, 2) capture and treat uncertainty due to imperfectness of information, 3) integrate measurements from heterogeneous natures (e.g. statistics, expert opinions, or simulation results). This work applies a game-theoretical model that uses random probability-distribution-valued payoffs to allow playing spot-checking games with diverging actions' outcomes as well as avoiding information loss due to combining several measurements into one representative (e.g. average).","PeriodicalId":269698,"journal":{"name":"SHCIS '17","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128564968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Architecture for Resource-Aware VMI-based Cloud Malware Analysis 基于资源感知vmi的云恶意软件分析体系结构
Pub Date : 2017-06-19 DOI: 10.1145/3099012.3099015
Benjamin Taubmann, Bojan Kolosnjaji
Virtual machine introspection (VMI) is a technology with many possible applications, such as malware analysis and intrusion detection. However, this technique is resource intensive, as inspecting program behavior includes recording of a high number of events caused by the analyzed binary and related processes. In this paper we present an architecture that leverages cloud resources for virtual machine-based malware analysis in order to train a classifier for detecting cloud-specific malware. This architecture is designed while having in mind the resource consumption when applying the VMI-based technology in production systems, in particular the overhead of tracing a large set of system calls. In order to minimize the data acquisition overhead, we use a data-driven approach from the area of resource-aware machine learning. This approach enables us to optimize the trade-off between malware detection performance and the overhead of our VMI-based tracing system.
虚拟机自省(VMI)是一种具有许多可能应用的技术,例如恶意软件分析和入侵检测。然而,这种技术是资源密集型的,因为检查程序行为包括记录由分析的二进制文件和相关进程引起的大量事件。在本文中,我们提出了一种利用云资源进行基于虚拟机的恶意软件分析的架构,以训练分类器来检测特定于云的恶意软件。在设计此体系结构时,考虑到在生产系统中应用基于vmi的技术时的资源消耗,特别是跟踪大量系统调用的开销。为了最大限度地减少数据采集开销,我们使用了资源感知机器学习领域的数据驱动方法。这种方法使我们能够优化恶意软件检测性能和基于vmi的跟踪系统开销之间的权衡。
{"title":"Architecture for Resource-Aware VMI-based Cloud Malware Analysis","authors":"Benjamin Taubmann, Bojan Kolosnjaji","doi":"10.1145/3099012.3099015","DOIUrl":"https://doi.org/10.1145/3099012.3099015","url":null,"abstract":"Virtual machine introspection (VMI) is a technology with many possible applications, such as malware analysis and intrusion detection. However, this technique is resource intensive, as inspecting program behavior includes recording of a high number of events caused by the analyzed binary and related processes. In this paper we present an architecture that leverages cloud resources for virtual machine-based malware analysis in order to train a classifier for detecting cloud-specific malware. This architecture is designed while having in mind the resource consumption when applying the VMI-based technology in production systems, in particular the overhead of tracing a large set of system calls. In order to minimize the data acquisition overhead, we use a data-driven approach from the area of resource-aware machine learning. This approach enables us to optimize the trade-off between malware detection performance and the overhead of our VMI-based tracing system.","PeriodicalId":269698,"journal":{"name":"SHCIS '17","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128428053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Anti-ProGuard: Towards Automated Deobfuscation of Android Apps Anti-ProGuard:实现Android应用程序的自动解混淆
Pub Date : 2017-06-19 DOI: 10.1145/3099012.3099020
Richard Baumann, Mykola Protsenko, Tilo Müller
A wide adoption of obfuscation techniques by Android application developers, and especially malware authors, introduces a high degree of complication into the process of reverse engineering, analysis, and security evaluation of third-party and potentially harmful apps. In this paper we present the early results of our research aiming to provide reliable means for automated deobfuscation of Android apps. According to the underlying approach, deobfuscation of a given app is performed by matching its code parts to the unobfuscated code stored in a database. For this purpose we apply well-known software similarity algorithms, such as SimHash and n-gram based ones. As a source of unobfuscated code can serve open source apps and libraries, as well as previously analyzed and manually deobfuscated code. Although the presented techniques are generic in their nature, our current prototype mainly targets Proguard, as one of the most widely used protection tools for Android performing primarily renaming obfuscation. The evaluation of the presented Anti-ProGuard tool witnesses its effectiveness for the considered task and supports the feasibility of the proposed approach.
Android应用程序开发人员,特别是恶意软件作者广泛采用混淆技术,这给第三方和潜在有害应用程序的逆向工程、分析和安全评估过程带来了高度的复杂性。在本文中,我们展示了我们的研究的早期结果,旨在为Android应用程序的自动解混淆提供可靠的方法。根据底层方法,通过将其代码部分与存储在数据库中的未混淆代码进行匹配来执行给定应用程序的去混淆。为此,我们应用了众所周知的软件相似性算法,如SimHash和基于n-gram的算法。作为未混淆代码的来源,可以服务于开源应用程序和库,以及以前分析和手动去混淆的代码。虽然所呈现的技术在本质上是通用的,但我们目前的原型主要针对Proguard,作为Android执行主要重命名混淆的最广泛使用的保护工具之一。对Anti-ProGuard工具的评估证明了其对所考虑任务的有效性,并支持了所提出方法的可行性。
{"title":"Anti-ProGuard: Towards Automated Deobfuscation of Android Apps","authors":"Richard Baumann, Mykola Protsenko, Tilo Müller","doi":"10.1145/3099012.3099020","DOIUrl":"https://doi.org/10.1145/3099012.3099020","url":null,"abstract":"A wide adoption of obfuscation techniques by Android application developers, and especially malware authors, introduces a high degree of complication into the process of reverse engineering, analysis, and security evaluation of third-party and potentially harmful apps.\u0000 In this paper we present the early results of our research aiming to provide reliable means for automated deobfuscation of Android apps. According to the underlying approach, deobfuscation of a given app is performed by matching its code parts to the unobfuscated code stored in a database. For this purpose we apply well-known software similarity algorithms, such as SimHash and n-gram based ones. As a source of unobfuscated code can serve open source apps and libraries, as well as previously analyzed and manually deobfuscated code.\u0000 Although the presented techniques are generic in their nature, our current prototype mainly targets Proguard, as one of the most widely used protection tools for Android performing primarily renaming obfuscation. The evaluation of the presented Anti-ProGuard tool witnesses its effectiveness for the considered task and supports the feasibility of the proposed approach.","PeriodicalId":269698,"journal":{"name":"SHCIS '17","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129764794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Towards a Generic Architecture for Interactive Cost-Aware Visualization of Monitoring Data in Distributed Systems 分布式系统监控数据交互可视化的通用体系结构研究
Pub Date : 2017-06-19 DOI: 10.1145/3099012.3099017
Noëlle Rakotondravony, Johannes Köstler, Hans P. Reiser
The collection of monitoring data in distributed systems can serve many different purposes, such as system status monitoring, performance evaluation, and optimization. There are many well-established approaches for data collection and visualization in these areas. For objectives such as debugging complex distributed applications, in-depth analysis of malicious attacks, and forensic investigations, the joint analysis and visualization of a large variety of data gathered at different layers of the system is of great value. The utilization of heavy-weight monitoring techniques requires a cost-aware on-demand activation of such monitoring. We present an architecture for an interactive and cost-aware visualization of monitoring data combined from multiple sources in distributed systems. We introduce two distinguishing properties: the possibilities to reconfigure data collection and a cost prediction mechanism that supports the user in a cost-aware, dynamic activation of monitoring components in an interactive in-depth analysis. We illustrate the use of such cost prediction for monitoring using VMI-based mechanisms.
在分布式系统中收集监视数据可以用于许多不同的目的,例如系统状态监视、性能评估和优化。在这些领域有许多行之有效的数据收集和可视化方法。对于调试复杂的分布式应用程序、深入分析恶意攻击和取证调查等目标,对系统不同层收集的大量数据进行联合分析和可视化具有重要价值。使用重要的监测技术需要有成本意识的按需启动这种监测。我们提出了一种架构,用于在分布式系统中对来自多个来源的监测数据进行交互式和成本意识可视化。我们介绍了两个不同的特性:重新配置数据收集的可能性和成本预测机制,该机制支持用户在交互式深度分析中对成本有意识、动态激活监控组件。我们使用基于vmi的机制来说明这种成本预测在监控中的使用。
{"title":"Towards a Generic Architecture for Interactive Cost-Aware Visualization of Monitoring Data in Distributed Systems","authors":"Noëlle Rakotondravony, Johannes Köstler, Hans P. Reiser","doi":"10.1145/3099012.3099017","DOIUrl":"https://doi.org/10.1145/3099012.3099017","url":null,"abstract":"The collection of monitoring data in distributed systems can serve many different purposes, such as system status monitoring, performance evaluation, and optimization. There are many well-established approaches for data collection and visualization in these areas. For objectives such as debugging complex distributed applications, in-depth analysis of malicious attacks, and forensic investigations, the joint analysis and visualization of a large variety of data gathered at different layers of the system is of great value. The utilization of heavy-weight monitoring techniques requires a cost-aware on-demand activation of such monitoring.\u0000 We present an architecture for an interactive and cost-aware visualization of monitoring data combined from multiple sources in distributed systems. We introduce two distinguishing properties: the possibilities to reconfigure data collection and a cost prediction mechanism that supports the user in a cost-aware, dynamic activation of monitoring components in an interactive in-depth analysis. We illustrate the use of such cost prediction for monitoring using VMI-based mechanisms.","PeriodicalId":269698,"journal":{"name":"SHCIS '17","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116333976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting JavaScript Apps from Code Analysis 保护JavaScript应用免受代码分析
Pub Date : 2017-06-19 DOI: 10.1145/3099012.3099018
Tobias Groß, Tilo Müller
Apps written in JavaScript are an easy target for reverse engineering attacks, e.g. to steal the intellectual property or to create a clone of an app. Unprotected JavaScript apps even contain high level information such as developer comments, if those were not explicitly stripped. This fact becomes more and more important with the increasing popularity of JavaScript as language of choice for both web development and hybrid mobile apps. In this paper, we present a novel JavaScript obfuscator based on the Google Closure Compiler, which transforms readable JavaScript source code into a representation much harder to analyze for adversaries. We evaluate this obfuscator regarding its performance impact and its semantics-preserving property.
用JavaScript编写的应用程序很容易成为逆向工程攻击的目标,例如窃取知识产权或创建应用程序的克隆。未受保护的JavaScript应用程序甚至包含高级信息,如开发人员评论,如果这些信息没有被明确删除的话。随着JavaScript作为web开发和混合移动应用的首选语言的日益普及,这一事实变得越来越重要。在本文中,我们提出了一种基于Google闭包编译器的新型JavaScript混淆器,它将可读的JavaScript源代码转换为一种更难以被对手分析的表示形式。我们评估了这个混淆器的性能影响和语义保持特性。
{"title":"Protecting JavaScript Apps from Code Analysis","authors":"Tobias Groß, Tilo Müller","doi":"10.1145/3099012.3099018","DOIUrl":"https://doi.org/10.1145/3099012.3099018","url":null,"abstract":"Apps written in JavaScript are an easy target for reverse engineering attacks, e.g. to steal the intellectual property or to create a clone of an app. Unprotected JavaScript apps even contain high level information such as developer comments, if those were not explicitly stripped. This fact becomes more and more important with the increasing popularity of JavaScript as language of choice for both web development and hybrid mobile apps. In this paper, we present a novel JavaScript obfuscator based on the Google Closure Compiler, which transforms readable JavaScript source code into a representation much harder to analyze for adversaries. We evaluate this obfuscator regarding its performance impact and its semantics-preserving property.","PeriodicalId":269698,"journal":{"name":"SHCIS '17","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122124533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards a Multi-objective Optimization Model to Support Information Security Investment Decision-making 一个支持信息安全投资决策的多目标优化模型
Pub Date : 2017-06-19 DOI: 10.1145/3099012.3099013
Eva Weishäupl
The protection of assets, including IT resources, intellectual property and business processes, against security attacks has become a challenging task for organizations. From an economic perspective, firms need to minimize the probability of a successful security incident or attack while staying within the boundaries of their information security budget in order to optimize their investment strategy. In this paper, an optimization model to support information security investment decision-making in organizations is proposed considering the two conflicting objectives (simultaneously minimizing the costs of countermeasures while maximizing the security level). Decision models that support the firms' decisions considering the trade-off between the security level and the investment allocation are beneficial for organizations to facilitate and justify security investment choices.
保护资产(包括IT资源、知识产权和业务流程)免受安全攻击已成为组织的一项具有挑战性的任务。从经济角度来看,企业需要最小化成功的安全事件或攻击的概率,同时保持在其信息安全预算的范围内,以优化其投资策略。本文提出了一个支持组织信息安全投资决策的优化模型,该模型考虑了两个相互冲突的目标(同时最小化对策成本和最大化安全级别)。支持公司考虑安全水平和投资分配之间权衡的决策模型有利于组织促进和证明安全投资选择。
{"title":"Towards a Multi-objective Optimization Model to Support Information Security Investment Decision-making","authors":"Eva Weishäupl","doi":"10.1145/3099012.3099013","DOIUrl":"https://doi.org/10.1145/3099012.3099013","url":null,"abstract":"The protection of assets, including IT resources, intellectual property and business processes, against security attacks has become a challenging task for organizations. From an economic perspective, firms need to minimize the probability of a successful security incident or attack while staying within the boundaries of their information security budget in order to optimize their investment strategy. In this paper, an optimization model to support information security investment decision-making in organizations is proposed considering the two conflicting objectives (simultaneously minimizing the costs of countermeasures while maximizing the security level). Decision models that support the firms' decisions considering the trade-off between the security level and the investment allocation are beneficial for organizations to facilitate and justify security investment choices.","PeriodicalId":269698,"journal":{"name":"SHCIS '17","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122842637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Virtual Machine Introspection Based SSH Honeypot 基于SSH蜜罐的虚拟机自省
Pub Date : 2017-06-19 DOI: 10.1145/3099012.3099016
Stewart Sentanoe, Benjamin Taubmann, Hans P. Reiser
A honeypot provides information about the new attack and exploitation methods and allows analyzing the adversary's activities during or after exploitation. One way of an adversary to communicate with a server is via secure shell (SSH). SSH provides secure login, file transfer, X11 forwarding, and TCP/IP connections over untrusted networks. SSH is a preferred target for attacks, as it is frequently used with password-based authentication, and weak passwords are easily exploited using brute-force attacks. In this paper, we introduce a Virtual Machine Introspection based SSH honeypot. We discuss the design of the system and how to extract valuable information such as the credential used by the attacker and the entered commands. Our experiments show that the system is able to detect the adversary's activities during and after exploitation, and it has advantages compared to currently used SSH honeypot approaches.
蜜罐提供有关新的攻击和利用方法的信息,并允许在利用期间或之后分析对手的活动。攻击者与服务器通信的一种方式是通过安全外壳(SSH)。SSH在不受信任的网络上提供安全登录、文件传输、X11转发和TCP/IP连接。SSH是攻击的首选目标,因为它经常与基于密码的身份验证一起使用,而弱密码很容易被暴力攻击利用。本文介绍了一种基于虚拟机自省的SSH蜜罐。我们讨论了系统的设计以及如何提取有价值的信息,如攻击者使用的凭据和输入的命令。我们的实验表明,该系统能够在攻击期间和攻击后检测到对手的活动,与目前使用的SSH蜜罐方法相比,它具有优势。
{"title":"Virtual Machine Introspection Based SSH Honeypot","authors":"Stewart Sentanoe, Benjamin Taubmann, Hans P. Reiser","doi":"10.1145/3099012.3099016","DOIUrl":"https://doi.org/10.1145/3099012.3099016","url":null,"abstract":"A honeypot provides information about the new attack and exploitation methods and allows analyzing the adversary's activities during or after exploitation. One way of an adversary to communicate with a server is via secure shell (SSH). SSH provides secure login, file transfer, X11 forwarding, and TCP/IP connections over untrusted networks. SSH is a preferred target for attacks, as it is frequently used with password-based authentication, and weak passwords are easily exploited using brute-force attacks.\u0000 In this paper, we introduce a Virtual Machine Introspection based SSH honeypot. We discuss the design of the system and how to extract valuable information such as the credential used by the attacker and the entered commands. Our experiments show that the system is able to detect the adversary's activities during and after exploitation, and it has advantages compared to currently used SSH honeypot approaches.","PeriodicalId":269698,"journal":{"name":"SHCIS '17","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122499343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
SHCIS '17
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1