首页 > 最新文献

2019 International Conference on Cybersecurity (ICoCSec)最新文献

英文 中文
Unintentional Insider Threats Countermeasures Model (UITCM) 无意内部威胁对策模型(UITCM)
Pub Date : 2019-09-01 DOI: 10.1109/ICoCSec47621.2019.8970986
Z. A. A. Abdelsadeq, S. N. Omar, N. Basir, Nur Fatin Nabila Binti Mohd Rafei Heng
Most organisations see technological controls as the solution to their information security problems. However, with all these technologies, it was evidently investigated that human errors are unavoidable.Unintentional insider is the biggest insider threat of all.Thus the objective of this paper is to propose a conceptual model as a countermeasure towards unintentional insider threats The proposed model in this research was adapted from (Generic Mitigation Strategies for Information Leaks) developed by Wan (2018) and (2019), It was expanded by combining it with UIT Mitigation Strategies and Countermeasures recommendations mentioned by previous studies.
大多数组织将技术控制视为信息安全问题的解决方案。然而,有了所有这些技术,很明显,人为错误是不可避免的。无意的内部人员是最大的内部威胁。因此,本文的目的是提出一个概念模型作为应对无意内部威胁的对策。本研究中提出的模型改编自Wan(2018)和(2019)开发的(信息泄漏的通用缓解策略),并将其与以前研究中提到的UIT缓解策略和对策建议相结合,对其进行了扩展。
{"title":"Unintentional Insider Threats Countermeasures Model (UITCM)","authors":"Z. A. A. Abdelsadeq, S. N. Omar, N. Basir, Nur Fatin Nabila Binti Mohd Rafei Heng","doi":"10.1109/ICoCSec47621.2019.8970986","DOIUrl":"https://doi.org/10.1109/ICoCSec47621.2019.8970986","url":null,"abstract":"Most organisations see technological controls as the solution to their information security problems. However, with all these technologies, it was evidently investigated that human errors are unavoidable.Unintentional insider is the biggest insider threat of all.Thus the objective of this paper is to propose a conceptual model as a countermeasure towards unintentional insider threats The proposed model in this research was adapted from (Generic Mitigation Strategies for Information Leaks) developed by Wan (2018) and (2019), It was expanded by combining it with UIT Mitigation Strategies and Countermeasures recommendations mentioned by previous studies.","PeriodicalId":272402,"journal":{"name":"2019 International Conference on Cybersecurity (ICoCSec)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132127002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Qos Approach For Internet Of Things (Iot) Environment Using Mqtt Protocol 基于Mqtt协议的物联网(Iot)环境的Qos方法
Pub Date : 2019-09-01 DOI: 10.1109/ICoCSec47621.2019.8971097
Abdulrahman Sameer Sadeq, R. Hassan, S. S. Al-Rawi, Ahmed Mahdi Jubair, A. Aman
Internet of Things (IoT) has been emerged as promising technology. The limited resources of the IoT objects have resulted in restrictions in data transfer. New protocols have been proposed to meet these requirements and restrictions. Message Queue Telemetry Transport (MQTT), Constrain Application Protocol (CoAP) and many other IoT application protocols have been proposed. In this paper a Quality of Service (QoS) approach using MQTT for IoT environment is proposed. MQTT provides three levels of QoS for different classes of traffic. However, the traffic flow between subscribers and publishers is not controlled since publishers send data to broker and broker forwards it to subscribers. The absent of reliable end to end flow control can result in an increased number of packet loss and delay. A flow control mechanism is designed to overcome the flow control problem of MQTTwhere publisher can overwhelm subscriber. The suggested flow control mechanism reduced the packet drop to 98%, while e2e delay reduced to 64% compared to the standard MQTT implementation.
物联网(IoT)已经成为一项有前途的技术。物联网对象的有限资源导致了数据传输的限制。为了满足这些要求和限制,已经提出了新的协议。消息队列遥测传输(MQTT)、约束应用协议(CoAP)和许多其他物联网应用协议已经被提出。本文提出了一种基于MQTT的物联网环境下的服务质量(QoS)方法。MQTT为不同类别的流量提供了三种级别的QoS。但是,订阅者和发布者之间的流量流不受控制,因为发布者将数据发送给代理,代理将其转发给订阅者。缺乏可靠的端到端流量控制会导致丢包和延迟的增加。流控制机制是为了克服mqtt流控制问题而设计的,在mqtt流控制问题中,发布者可能压倒订阅者。与标准MQTT实现相比,建议的流控制机制将数据包丢包率降低到98%,而端到端延迟降低到64%。
{"title":"A Qos Approach For Internet Of Things (Iot) Environment Using Mqtt Protocol","authors":"Abdulrahman Sameer Sadeq, R. Hassan, S. S. Al-Rawi, Ahmed Mahdi Jubair, A. Aman","doi":"10.1109/ICoCSec47621.2019.8971097","DOIUrl":"https://doi.org/10.1109/ICoCSec47621.2019.8971097","url":null,"abstract":"Internet of Things (IoT) has been emerged as promising technology. The limited resources of the IoT objects have resulted in restrictions in data transfer. New protocols have been proposed to meet these requirements and restrictions. Message Queue Telemetry Transport (MQTT), Constrain Application Protocol (CoAP) and many other IoT application protocols have been proposed. In this paper a Quality of Service (QoS) approach using MQTT for IoT environment is proposed. MQTT provides three levels of QoS for different classes of traffic. However, the traffic flow between subscribers and publishers is not controlled since publishers send data to broker and broker forwards it to subscribers. The absent of reliable end to end flow control can result in an increased number of packet loss and delay. A flow control mechanism is designed to overcome the flow control problem of MQTTwhere publisher can overwhelm subscriber. The suggested flow control mechanism reduced the packet drop to 98%, while e2e delay reduced to 64% compared to the standard MQTT implementation.","PeriodicalId":272402,"journal":{"name":"2019 International Conference on Cybersecurity (ICoCSec)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131074804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Using Text Annotation Tool on Cyber Security News — A Review 使用文本注释工具处理网络安全新闻综述
Pub Date : 2019-09-01 DOI: 10.1109/ICoCSec47621.2019.8970885
M. S. Abdullah, A. Zainal, M. A. Maarof, Mohamad Nizam Kassim
Cyber-attack has become one of the main concern in our everyday life and being reported throughout online news website. As thousands of news article existed, it is difficult to go through all the news which lead to a slower analyzing process. Hence, a vital text mining component known as Information Extraction (IE) is needed in order to ease the knowledge discovery process for the wide collection of the cyber security news. To make IE process better and easier, the usage of tool such as General Architecture for Text Engineering (GATE) can help a lot especially in creating annotated corpus. In this paper, we will introduce and reviewing several annotation tools that are freely available and also to discuss steps needed to create an annotated corpus for the cyber security text documents.
网络攻击已经成为我们日常生活中主要关注的问题之一,并在在线新闻网站上得到报道。由于成千上万的新闻文章存在,很难遍历所有的新闻,导致分析过程较慢。因此,需要一种重要的文本挖掘组件,即信息抽取(Information Extraction, IE),以简化广泛收集的网络安全新闻的知识发现过程。为了使IE过程更好、更容易,使用诸如GATE之类的工具可以提供很多帮助,特别是在创建带注释的语料库时。在本文中,我们将介绍和回顾几种免费提供的注释工具,并讨论为网络安全文本文档创建注释语料库所需的步骤。
{"title":"Using Text Annotation Tool on Cyber Security News — A Review","authors":"M. S. Abdullah, A. Zainal, M. A. Maarof, Mohamad Nizam Kassim","doi":"10.1109/ICoCSec47621.2019.8970885","DOIUrl":"https://doi.org/10.1109/ICoCSec47621.2019.8970885","url":null,"abstract":"Cyber-attack has become one of the main concern in our everyday life and being reported throughout online news website. As thousands of news article existed, it is difficult to go through all the news which lead to a slower analyzing process. Hence, a vital text mining component known as Information Extraction (IE) is needed in order to ease the knowledge discovery process for the wide collection of the cyber security news. To make IE process better and easier, the usage of tool such as General Architecture for Text Engineering (GATE) can help a lot especially in creating annotated corpus. In this paper, we will introduce and reviewing several annotation tools that are freely available and also to discuss steps needed to create an annotated corpus for the cyber security text documents.","PeriodicalId":272402,"journal":{"name":"2019 International Conference on Cybersecurity (ICoCSec)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126450610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature Extraction and Selection Method of Cyber-Attack and Threat Profiling in Cybersecurity Audit 网络安全审计中网络攻击与威胁分析特征提取与选择方法
Pub Date : 2019-09-01 DOI: 10.1109/ICoCSec47621.2019.8970786
Khairun Nisyak Zakaria, A. Zainal, S. H. Othman, Mohamad Nizam Kassim
Public sector and private organizations began using cybersecurity control in order to defend their assets against cybercriminals attack. Cybersecurity audits assist organizations to deal with cyber threats, cybercriminals, and cyber-attacks thatare growing in an aggressive cyber landscape. However, cyber-attacks and threats become more increase and complex in complicated cyber landscapes challenge auditors to perform an effective cybersecurity audit. This current situation puts in evidens ce the critical need for a new approach in the cybersecurity audit execution. This study reviews an alternative method in the execution of cybersecurity security checks. The analysis is on the character and behavioral of cyber-attacks and threats using feature extraction and selection method to get crucial elements from the common group of cyber-attacks and threats. Cyber-attacks and threats profile are systematic approaches driven by a clear understanding of the form of cyber-attacks and threats character and behavior patterns in cybersecurity requirements. As a result, this study proposes cyber-attacks and threats profiling for cybersecurity audit as a set of control elements that are harmonized with audit components that drive audits based on cyber threats.
公共部门和私人组织开始使用网络安全控制来保护他们的资产免受网络罪犯的攻击。网络安全审计帮助组织应对网络威胁、网络犯罪和网络攻击,这些都是在激烈的网络环境中不断增长的。然而,在复杂的网络环境中,网络攻击和威胁变得越来越多,越来越复杂,这对审计人员进行有效的网络安全审计提出了挑战。目前的情况表明,在网络安全审计执行中迫切需要一种新的方法。本研究回顾了执行网络安全检查的另一种方法。分析了网络攻击和威胁的特征和行为,采用特征提取和选择方法,从常见的网络攻击和威胁中提取关键要素。网络攻击和威胁概要是由对网络安全需求中网络攻击和威胁的特征和行为模式的清晰理解驱动的系统方法。因此,本研究建议将网络安全审计的网络攻击和威胁分析作为一组控制元素,这些控制元素与驱动基于网络威胁的审计的审计组件相协调。
{"title":"Feature Extraction and Selection Method of Cyber-Attack and Threat Profiling in Cybersecurity Audit","authors":"Khairun Nisyak Zakaria, A. Zainal, S. H. Othman, Mohamad Nizam Kassim","doi":"10.1109/ICoCSec47621.2019.8970786","DOIUrl":"https://doi.org/10.1109/ICoCSec47621.2019.8970786","url":null,"abstract":"Public sector and private organizations began using cybersecurity control in order to defend their assets against cybercriminals attack. Cybersecurity audits assist organizations to deal with cyber threats, cybercriminals, and cyber-attacks thatare growing in an aggressive cyber landscape. However, cyber-attacks and threats become more increase and complex in complicated cyber landscapes challenge auditors to perform an effective cybersecurity audit. This current situation puts in evidens ce the critical need for a new approach in the cybersecurity audit execution. This study reviews an alternative method in the execution of cybersecurity security checks. The analysis is on the character and behavioral of cyber-attacks and threats using feature extraction and selection method to get crucial elements from the common group of cyber-attacks and threats. Cyber-attacks and threats profile are systematic approaches driven by a clear understanding of the form of cyber-attacks and threats character and behavior patterns in cybersecurity requirements. As a result, this study proposes cyber-attacks and threats profiling for cybersecurity audit as a set of control elements that are harmonized with audit components that drive audits based on cyber threats.","PeriodicalId":272402,"journal":{"name":"2019 International Conference on Cybersecurity (ICoCSec)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115239293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Review of Digital Wallet Requirements 检讨数码钱包的要求
Pub Date : 2019-09-01 DOI: 10.1109/ICoCSec47621.2019.8970996
Md Arif Hassan, Z. Shukur
The financial industry has proven to be an important factor in our daily lives through the adaption of new technology. Fintech companies are driven towards enhancing financial services currently being provided by consecutive financial institutions. Digital wallet is the latest invention of finance technology, which is a great tool for making our payment transaction very easily and fast. Many digital wallet applications have already been developed and implemented in payment transactions. An effective number of cyber threats targetting the monetary system have made security an imperative component of the banking system. This paper outlines the digital wallets’ threats and also provides the requirements of digital wallets that technically try to address the fear of security customers as usual providers,,while assisting in the successful implementation of digital wallets.
通过对新技术的适应,金融行业已经被证明是我们日常生活中的一个重要因素。金融科技公司正在推动现有金融机构提供的金融服务。数字钱包是金融技术的最新发明,它是一个伟大的工具,使我们的支付交易非常容易和快速。许多数字钱包应用程序已经在支付交易中开发和实现。大量针对货币体系的网络威胁使得安全成为银行体系的重要组成部分。本文概述了数字钱包的威胁,并提供了数字钱包的要求,这些要求在技术上试图解决安全客户对通常提供商的恐惧,同时协助成功实施数字钱包。
{"title":"Review of Digital Wallet Requirements","authors":"Md Arif Hassan, Z. Shukur","doi":"10.1109/ICoCSec47621.2019.8970996","DOIUrl":"https://doi.org/10.1109/ICoCSec47621.2019.8970996","url":null,"abstract":"The financial industry has proven to be an important factor in our daily lives through the adaption of new technology. Fintech companies are driven towards enhancing financial services currently being provided by consecutive financial institutions. Digital wallet is the latest invention of finance technology, which is a great tool for making our payment transaction very easily and fast. Many digital wallet applications have already been developed and implemented in payment transactions. An effective number of cyber threats targetting the monetary system have made security an imperative component of the banking system. This paper outlines the digital wallets’ threats and also provides the requirements of digital wallets that technically try to address the fear of security customers as usual providers,,while assisting in the successful implementation of digital wallets.","PeriodicalId":272402,"journal":{"name":"2019 International Conference on Cybersecurity (ICoCSec)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128929493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Mobile Malware Classification for Social Media Application 针对社交媒体应用的移动恶意软件分类
Pub Date : 2019-09-01 DOI: 10.1109/ICoCSec47621.2019.8970800
M. Saudi, Azuan Ahmad, Sharifah Roziah Mohd Kassim, M. A. Husainiamer, Anas Zulkifli Kassim, N. J. Zaizi
Organisations and users face many challenges against smartphone in detecting mobile malware attacks. Many techniques have been developed by different solution providers to ensure that smartphones remain free from such attacks. Nonetheless, we still lack efficient techniques to detect mobile malware attacks, especially for the social media application. Hence, this paper presents mobile malware classifications based on API and permission that can be used for mobile malware detection with regard to the social media applications. A mobile malware classification based on correlation of malware behaviour, vulnerability exploitation and mobile phone has been developed for this purpose and a mobile application (app) has been sought to support this new classification. This research was conducted in a controlled lab environment using open source tools and by applying hybrid analysis. Based on the testing conducted, the results showed that the mobile apps were categorized as dangerous with 16% for call log exploitation, 13% for audio exploitation and 9% for GPS exploitation. These results indicated that the attackers could launch possible different cyber attacks. In future, this paper can be used as reference for other researchers with the same interest.
组织和用户在智能手机检测移动恶意软件攻击方面面临许多挑战。不同的解决方案提供商开发了许多技术,以确保智能手机免受此类攻击。尽管如此,我们仍然缺乏有效的技术来检测移动恶意软件攻击,特别是针对社交媒体应用程序。因此,本文提出了基于API和权限的移动恶意软件分类,可用于针对社交媒体应用程序的移动恶意软件检测。基于恶意软件行为、漏洞利用和手机的相关性,已经为此目的开发了一种移动恶意软件分类,并且已经寻求一种移动应用程序(app)来支持这种新的分类。这项研究是在一个受控的实验室环境中进行的,使用了开源工具并应用了混合分析。根据所进行的测试,结果显示,这些移动应用程序被归类为危险应用程序,其中16%用于通话记录利用,13%用于音频利用,9%用于GPS利用。这些结果表明,攻击者可能会发动不同的网络攻击。今后,本文可以为其他有相同兴趣的研究者提供参考。
{"title":"Mobile Malware Classification for Social Media Application","authors":"M. Saudi, Azuan Ahmad, Sharifah Roziah Mohd Kassim, M. A. Husainiamer, Anas Zulkifli Kassim, N. J. Zaizi","doi":"10.1109/ICoCSec47621.2019.8970800","DOIUrl":"https://doi.org/10.1109/ICoCSec47621.2019.8970800","url":null,"abstract":"Organisations and users face many challenges against smartphone in detecting mobile malware attacks. Many techniques have been developed by different solution providers to ensure that smartphones remain free from such attacks. Nonetheless, we still lack efficient techniques to detect mobile malware attacks, especially for the social media application. Hence, this paper presents mobile malware classifications based on API and permission that can be used for mobile malware detection with regard to the social media applications. A mobile malware classification based on correlation of malware behaviour, vulnerability exploitation and mobile phone has been developed for this purpose and a mobile application (app) has been sought to support this new classification. This research was conducted in a controlled lab environment using open source tools and by applying hybrid analysis. Based on the testing conducted, the results showed that the mobile apps were categorized as dangerous with 16% for call log exploitation, 13% for audio exploitation and 9% for GPS exploitation. These results indicated that the attackers could launch possible different cyber attacks. In future, this paper can be used as reference for other researchers with the same interest.","PeriodicalId":272402,"journal":{"name":"2019 International Conference on Cybersecurity (ICoCSec)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114430131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
TAGraph: Knowledge Graph of Threat Actor 图表:威胁行为者的知识图谱
Pub Date : 2019-09-01 DOI: 10.1109/ICoCSec47621.2019.8970979
Eric Khoo Jiun Hooi, A. Zainal, M. A. Maarof, Mohamad Nizam Kassim
Understanding of cybersecurity threat landscape especially information about threat actor is a challenging task as these information are usually hidden and scattered. The online news had became one of the popular and important source of information for cybersecurity personnels to understand about the activities conducted by these threat actors. In this paper, we propose a framework to create knowledge graph of threat actor by building ontology of threat actor and named entity recognition system to extract cybersecurity-related entities. The resulting ontology and model can be used to automatically extract cybesecurity-related entities from an article and create knowledge graph of threatactor.
了解网络安全威胁形势,特别是有关威胁行为者的信息是一项具有挑战性的任务,因为这些信息通常是隐藏和分散的。网络新闻已成为网络安全人员了解这些威胁行为者所进行活动的流行和重要信息来源之一。本文通过构建威胁行为者本体和命名实体识别系统提取网络安全相关实体,提出了一种构建威胁行为者知识图谱的框架。生成的本体和模型可用于从文章中自动提取网络安全相关实体,并创建威胁者的知识图谱。
{"title":"TAGraph: Knowledge Graph of Threat Actor","authors":"Eric Khoo Jiun Hooi, A. Zainal, M. A. Maarof, Mohamad Nizam Kassim","doi":"10.1109/ICoCSec47621.2019.8970979","DOIUrl":"https://doi.org/10.1109/ICoCSec47621.2019.8970979","url":null,"abstract":"Understanding of cybersecurity threat landscape especially information about threat actor is a challenging task as these information are usually hidden and scattered. The online news had became one of the popular and important source of information for cybersecurity personnels to understand about the activities conducted by these threat actors. In this paper, we propose a framework to create knowledge graph of threat actor by building ontology of threat actor and named entity recognition system to extract cybersecurity-related entities. The resulting ontology and model can be used to automatically extract cybesecurity-related entities from an article and create knowledge graph of threatactor.","PeriodicalId":272402,"journal":{"name":"2019 International Conference on Cybersecurity (ICoCSec)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114912883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Theoretical Review: Risk Mitigation Through Trusted Human Framework for Insider Threats 理论综述:通过可信任的人的内部威胁框架降低风险
Pub Date : 2019-09-01 DOI: 10.1109/ICoCSec47621.2019.8970795
Mohd Nazer Apau, Muliati Sedek, R. Ahmad
This paper discusses the possible effort to mitigate insider threats risk and aim to inspire organizations to consider identifying insider threats as one of the risks in the company’s enterprise risk management activities. The paper suggests Trusted Human Framework (THF) as the on-going and cyclic process to detect and deter potential employees who bound to become the fraudster or perpetrator violating the access and trust given. The mitigation’s control statements were derived from the recommended practices in the “Common Sense Guide to Mitigating Insider Threats” produced by the Software Engineering Institute, Carnegie Mellon University (SEI-CMU). The statements validated via a survey which was responded by fifty respondents who work in Malaysia.
本文讨论了减轻内部威胁风险的可能努力,旨在激励组织考虑将内部威胁作为公司企业风险管理活动中的风险之一。本文提出可信任人框架(Trusted Human Framework, THF)作为一种持续循环的过程来检测和阻止潜在的员工,这些员工必然会成为违反访问和信任的欺诈者或犯罪者。缓解的控制声明来源于卡内基梅隆大学软件工程研究所(SEI-CMU)制作的“缓解内部威胁的常识指南”中的推荐实践。这些陈述通过一项由50名在马来西亚工作的受访者回应的调查得到了验证。
{"title":"A Theoretical Review: Risk Mitigation Through Trusted Human Framework for Insider Threats","authors":"Mohd Nazer Apau, Muliati Sedek, R. Ahmad","doi":"10.1109/ICoCSec47621.2019.8970795","DOIUrl":"https://doi.org/10.1109/ICoCSec47621.2019.8970795","url":null,"abstract":"This paper discusses the possible effort to mitigate insider threats risk and aim to inspire organizations to consider identifying insider threats as one of the risks in the company’s enterprise risk management activities. The paper suggests Trusted Human Framework (THF) as the on-going and cyclic process to detect and deter potential employees who bound to become the fraudster or perpetrator violating the access and trust given. The mitigation’s control statements were derived from the recommended practices in the “Common Sense Guide to Mitigating Insider Threats” produced by the Software Engineering Institute, Carnegie Mellon University (SEI-CMU). The statements validated via a survey which was responded by fifty respondents who work in Malaysia.","PeriodicalId":272402,"journal":{"name":"2019 International Conference on Cybersecurity (ICoCSec)","volume":"589 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133910891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Spear Phishing Simulation in Critical Sector: Telecommunication and Defense Sub-sector 关键部门的鱼叉式网络钓鱼模拟:电信和国防分部门
Pub Date : 2019-09-01 DOI: 10.1109/ICoCSec47621.2019.8970803
Ahmad Syukri Abdullah, M. Mohd
Phishing is an attack that uses social engineering techniques to steal users’ confidential information like passwords and banking information. It happens when cyber criminals disguised as a trusted entity and deceived users to click on fake links in e-mail received by the user. Cyber criminals also act to target phishing attacks from individuals to organizations that are specific to the country's critical sector, and this is known as a spear phishing. In fact, the telecommunication sector is one of the main targets of cyber criminals using spear phishing attacks to obtain user-sensitive information. The main objective of this work is to identify the level of cyber security in the organization under the telecommunication sector and defense sub-sector by using existing general simulation procedure. The procedure is adapted and modified according to the organization’s working environment. The first simulation was conducted on June 4, 2018 involving 39 employees. Findings showed that all respondents did not respond to the spear phishing e-mails received. In fact, the results of the questionnaire conducted after the end of the simulation found that all respondents were able to identify all indicators on spear phishing e-mails quickly and easily. This proves that the level of awareness and knowledge of cyber security of the population is high. The second simulation was conducted in stages, from October 29 to November 15, 2018 using a different approach. Of the 39 e-mails sent, 12 respondents (31%) responded to the received e-mail by clicking on the link in the e-mail content. Based on the results of this second simulation, this spear phishing attack was successfully implemented and proved that the new simulation procedure can be used in the telecommunication sector and defense sub-sector.
网络钓鱼是一种利用社会工程技术窃取用户密码和银行信息等机密信息的攻击。网络犯罪分子伪装成受信任的实体,欺骗用户点击用户收到的电子邮件中的虚假链接。网络犯罪分子还针对针对国家关键部门的个人对组织的网络钓鱼攻击采取行动,这被称为鱼叉式网络钓鱼。事实上,电信行业是网络罪犯利用鱼叉式网络钓鱼攻击获取用户敏感信息的主要目标之一。这项工作的主要目标是通过使用现有的通用模拟程序,确定电信部门和国防子部门下组织的网络安全水平。该程序应根据组织的工作环境进行调整和修改。第一次模拟于2018年6月4日进行,涉及39名员工。调查结果显示,所有受访者都没有回复收到的鱼叉式网络钓鱼邮件。事实上,在模拟结束后进行的问卷调查结果发现,所有受访者都能够快速轻松地识别出鱼叉式网络钓鱼电子邮件的所有指标。这证明了人们对网络安全的意识和知识水平是很高的。第二次模拟于2018年10月29日至11月15日分阶段进行,使用了不同的方法。在发出的39封电子邮件中,有12名受访者(31%)通过点击电子邮件内容中的链接对收到的电子邮件作出回应。基于第二次仿真的结果,成功实施了鱼叉式网络钓鱼攻击,并证明了该仿真程序可用于电信行业和国防子行业。
{"title":"Spear Phishing Simulation in Critical Sector: Telecommunication and Defense Sub-sector","authors":"Ahmad Syukri Abdullah, M. Mohd","doi":"10.1109/ICoCSec47621.2019.8970803","DOIUrl":"https://doi.org/10.1109/ICoCSec47621.2019.8970803","url":null,"abstract":"Phishing is an attack that uses social engineering techniques to steal users’ confidential information like passwords and banking information. It happens when cyber criminals disguised as a trusted entity and deceived users to click on fake links in e-mail received by the user. Cyber criminals also act to target phishing attacks from individuals to organizations that are specific to the country's critical sector, and this is known as a spear phishing. In fact, the telecommunication sector is one of the main targets of cyber criminals using spear phishing attacks to obtain user-sensitive information. The main objective of this work is to identify the level of cyber security in the organization under the telecommunication sector and defense sub-sector by using existing general simulation procedure. The procedure is adapted and modified according to the organization’s working environment. The first simulation was conducted on June 4, 2018 involving 39 employees. Findings showed that all respondents did not respond to the spear phishing e-mails received. In fact, the results of the questionnaire conducted after the end of the simulation found that all respondents were able to identify all indicators on spear phishing e-mails quickly and easily. This proves that the level of awareness and knowledge of cyber security of the population is high. The second simulation was conducted in stages, from October 29 to November 15, 2018 using a different approach. Of the 39 e-mails sent, 12 respondents (31%) responded to the received e-mail by clicking on the link in the e-mail content. Based on the results of this second simulation, this spear phishing attack was successfully implemented and proved that the new simulation procedure can be used in the telecommunication sector and defense sub-sector.","PeriodicalId":272402,"journal":{"name":"2019 International Conference on Cybersecurity (ICoCSec)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122926414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Framework Design for Secured Local Cloud Data Query Processing Analysis 安全本地云数据查询处理分析框架设计
Pub Date : 2019-09-01 DOI: 10.1109/ICoCSec47621.2019.8970973
A. Aman, Zainalabideen Ali Rahemm Al-Mayyah, R. Hassan, A. Hashim, Amjed Sid Ahmed Mohamed Sid, Ahmed Mahdi Jubair
Cloud computing is a vastly growing technology that enables more users and organizations to transfer their services to the cloud. With the exploitation of public cloud computing infrastructures, the usage of clouds to provide data query services is becoming an attractive solution due to its numerous benefits on scalability and cost-minimizing. The cloud services especially the database-as-a-service have tended to encrypt sensitive data before the migration over the cloud. Encrypting data would facilitate protecting private information from any violation by the service provider. Several studies have addressed the handling of cloud query processing by providing approaches to maintain the privacy of the data stored within the cloud. During their studies, researchers have proposed different types of encryption methods, each encryption method provides a specific level of security which comes with an opposite level of efficiency. This research is focused on framework design to evaluate cloud data query processing locally using two encryption methods namely AES and RSA. The parameters chosen are time consumption for encryption and decryption along with secrecy or the strength of the encryption and decryption.
云计算是一项飞速发展的技术,它使更多的用户和组织能够将他们的服务转移到云上。随着公共云计算基础设施的开发,使用云来提供数据查询服务正成为一种有吸引力的解决方案,因为它在可伸缩性和成本最小化方面有许多好处。云服务(尤其是数据库即服务)倾向于在迁移到云之前对敏感数据进行加密。加密数据将有助于保护私人信息免受服务提供商的任何侵犯。一些研究通过提供维护存储在云中的数据隐私的方法来解决云查询处理的处理问题。在他们的研究中,研究人员提出了不同类型的加密方法,每种加密方法都提供了特定级别的安全性,并且具有相反的效率水平。本文主要研究了使用AES和RSA两种加密方法来评估云数据本地查询处理的框架设计。所选择的参数是加密和解密的时间消耗以及加密和解密的保密性或强度。
{"title":"Framework Design for Secured Local Cloud Data Query Processing Analysis","authors":"A. Aman, Zainalabideen Ali Rahemm Al-Mayyah, R. Hassan, A. Hashim, Amjed Sid Ahmed Mohamed Sid, Ahmed Mahdi Jubair","doi":"10.1109/ICoCSec47621.2019.8970973","DOIUrl":"https://doi.org/10.1109/ICoCSec47621.2019.8970973","url":null,"abstract":"Cloud computing is a vastly growing technology that enables more users and organizations to transfer their services to the cloud. With the exploitation of public cloud computing infrastructures, the usage of clouds to provide data query services is becoming an attractive solution due to its numerous benefits on scalability and cost-minimizing. The cloud services especially the database-as-a-service have tended to encrypt sensitive data before the migration over the cloud. Encrypting data would facilitate protecting private information from any violation by the service provider. Several studies have addressed the handling of cloud query processing by providing approaches to maintain the privacy of the data stored within the cloud. During their studies, researchers have proposed different types of encryption methods, each encryption method provides a specific level of security which comes with an opposite level of efficiency. This research is focused on framework design to evaluate cloud data query processing locally using two encryption methods namely AES and RSA. The parameters chosen are time consumption for encryption and decryption along with secrecy or the strength of the encryption and decryption.","PeriodicalId":272402,"journal":{"name":"2019 International Conference on Cybersecurity (ICoCSec)","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131731235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 International Conference on Cybersecurity (ICoCSec)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1