首页 > 最新文献

2017 International Conference On Cyber Incident Response, Coordination, Containment & Control (Cyber Incident)最新文献

英文 中文
A case study about the use and evaluation of cyber deceptive methods against highly targeted attacks 针对高度针对性攻击的网络欺骗方法的使用和评估案例研究
Alexandria Farar, Hayretdin Bahsi, Bernhards Blumbergs
Traditional defences such as intrusion detection systems, firewalls and antivirus software are not enough to prevent security breaches caused by highly targeted cyber threats. As many of these attacks go undetected, this paper shows the results of a case study which consists of implementation of a methodology that selects, maps, deploys, tests and monitors the deceptions for the purpose of early detection. Metrics are developed to validate the effectiveness of the deception implementation. Firstly, various deception mechanisms are mapped to the first three phases of the intrusion kill chain: reconnaissance, weaponization and delivery. Then, Red Teams were recruited to test the deceptions for two case scenarios. Applying metrics, it is shown that the deceptions in the case studies are effective in the detection of cyber threats before the target asset was exploited and successful in creating attacker confusion and uncertainty about the organization’s network topology, services and resources.
传统的防御措施,如入侵检测系统、防火墙和杀毒软件,不足以防止由高度针对性的网络威胁造成的安全漏洞。由于许多此类攻击未被发现,本文展示了一个案例研究的结果,该案例研究包括一种方法的实施,该方法可以选择、映射、部署、测试和监控欺骗行为,以便及早发现。开发了度量来验证欺骗实现的有效性。首先,将各种欺骗机制映射到入侵杀伤链的前三个阶段:侦察、武器化和交付。然后,红队被招募来测试两种情况下的欺骗。应用度量,案例研究表明,在目标资产被利用之前,欺骗手段在检测网络威胁方面是有效的,并成功地使攻击者对组织的网络拓扑、服务和资源产生困惑和不确定性。
{"title":"A case study about the use and evaluation of cyber deceptive methods against highly targeted attacks","authors":"Alexandria Farar, Hayretdin Bahsi, Bernhards Blumbergs","doi":"10.1109/CYBERINCIDENT.2017.8054640","DOIUrl":"https://doi.org/10.1109/CYBERINCIDENT.2017.8054640","url":null,"abstract":"Traditional defences such as intrusion detection systems, firewalls and antivirus software are not enough to prevent security breaches caused by highly targeted cyber threats. As many of these attacks go undetected, this paper shows the results of a case study which consists of implementation of a methodology that selects, maps, deploys, tests and monitors the deceptions for the purpose of early detection. Metrics are developed to validate the effectiveness of the deception implementation. Firstly, various deception mechanisms are mapped to the first three phases of the intrusion kill chain: reconnaissance, weaponization and delivery. Then, Red Teams were recruited to test the deceptions for two case scenarios. Applying metrics, it is shown that the deceptions in the case studies are effective in the detection of cyber threats before the target asset was exploited and successful in creating attacker confusion and uncertainty about the organization’s network topology, services and resources.","PeriodicalId":298850,"journal":{"name":"2017 International Conference On Cyber Incident Response, Coordination, Containment & Control (Cyber Incident)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134633996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic adaptation and reconfiguration of security in mobile devices 移动设备安全的动态适应与重构
Mohamed Amoud, O. Roudiès
Mobile Devices offer enriched services and information for the end users. Achieving security in such a dynamic and heterogeneous environment is a challenging task. Hence, adaptive security is an applicable solution for this challenge. It is able to automatically select security mechanisms and their parameters at runtime in order to preserve the required security level in a changing environment. In this paper, we propose a self-adaptive security solution for Mobile Devices (Smartphone, Tablets,...) based on the combination of the MAPE-K reference model to dynamic negotiate and deploy of security policies, and DSPL approach to reconfigure the security level of the applications at runtime and monitor the changes in the context. The novelty of our approach comes from dynamic negotiation of security policies and automatic reconfiguration of security level to instantiate the new security policies at runtime in order to be capable of deploying adaptive security mechanisms to satisfy different security needs at different conditions.
移动设备为终端用户提供丰富的服务和信息。在这样一个动态和异构的环境中实现安全是一项具有挑战性的任务。因此,自适应安全性是应对这一挑战的一种适用解决方案。它能够在运行时自动选择安全机制及其参数,以便在不断变化的环境中保持所需的安全级别。在本文中,我们提出了一种移动设备(智能手机、平板电脑等)的自适应安全解决方案,该解决方案基于MAPE-K参考模型来动态协商和部署安全策略,以及DSPL方法来在运行时重新配置应用程序的安全级别并监控上下文中的变化。该方法的新颖之处在于安全策略的动态协商和安全级别的自动重新配置,以便在运行时实例化新的安全策略,从而能够部署自适应的安全机制,以满足不同条件下的不同安全需求。
{"title":"Dynamic adaptation and reconfiguration of security in mobile devices","authors":"Mohamed Amoud, O. Roudiès","doi":"10.1109/CYBERINCIDENT.2017.8054639","DOIUrl":"https://doi.org/10.1109/CYBERINCIDENT.2017.8054639","url":null,"abstract":"Mobile Devices offer enriched services and information for the end users. Achieving security in such a dynamic and heterogeneous environment is a challenging task. Hence, adaptive security is an applicable solution for this challenge. It is able to automatically select security mechanisms and their parameters at runtime in order to preserve the required security level in a changing environment. In this paper, we propose a self-adaptive security solution for Mobile Devices (Smartphone, Tablets,...) based on the combination of the MAPE-K reference model to dynamic negotiate and deploy of security policies, and DSPL approach to reconfigure the security level of the applications at runtime and monitor the changes in the context. The novelty of our approach comes from dynamic negotiation of security policies and automatic reconfiguration of security level to instantiate the new security policies at runtime in order to be capable of deploying adaptive security mechanisms to satisfy different security needs at different conditions.","PeriodicalId":298850,"journal":{"name":"2017 International Conference On Cyber Incident Response, Coordination, Containment & Control (Cyber Incident)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124837186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Robust anti – swing control of 3D crane system using GA – FUZZY 基于遗传-模糊算法的三维起重机系统鲁棒抗摆控制
T. Hoang, Nhi-Yen Tran-Thi
This paper proposes an alternative fuzzy logic controller to create the anti-swing controller of the 3D crane system. Simultaneously, it uses more genetic algorithms (GA) to optimize the parameters inside the crane controller. The controller’s purpose controls the crane’s position and maintains the smallest payload swing angle possible at the desired position in order to reduce industrial accidents and increase work performance. In addition, we create a new fuzzy rule which is more effective than other fuzzy rules or controllers. This completely solves the position control but the payload swing angle is still small, making it difficult for the other controllers. Moreover, the simulated results from the proposed fuzzy rule demonstrate better robust stabilization when compared with the other fuzzy rules or controllers.
本文提出了一种替代模糊控制器来创建三维起重机系统的防摆控制器。同时,采用遗传算法对起重机控制器内部参数进行优化。控制器的目的是控制起重机的位置,并在期望的位置保持最小的有效载荷摆动角,以减少工业事故,提高工作性能。此外,我们还创建了一个新的模糊规则,它比其他模糊规则或控制器更有效。这完全解决了位置控制问题,但有效载荷摆角仍然很小,给其他控制器带来了困难。仿真结果表明,与其他模糊规则或控制器相比,该模糊规则具有更好的鲁棒镇定性。
{"title":"Robust anti – swing control of 3D crane system using GA – FUZZY","authors":"T. Hoang, Nhi-Yen Tran-Thi","doi":"10.1109/CYBERINCIDENT.2017.8054638","DOIUrl":"https://doi.org/10.1109/CYBERINCIDENT.2017.8054638","url":null,"abstract":"This paper proposes an alternative fuzzy logic controller to create the anti-swing controller of the 3D crane system. Simultaneously, it uses more genetic algorithms (GA) to optimize the parameters inside the crane controller. The controller’s purpose controls the crane’s position and maintains the smallest payload swing angle possible at the desired position in order to reduce industrial accidents and increase work performance. In addition, we create a new fuzzy rule which is more effective than other fuzzy rules or controllers. This completely solves the position control but the payload swing angle is still small, making it difficult for the other controllers. Moreover, the simulated results from the proposed fuzzy rule demonstrate better robust stabilization when compared with the other fuzzy rules or controllers.","PeriodicalId":298850,"journal":{"name":"2017 International Conference On Cyber Incident Response, Coordination, Containment & Control (Cyber Incident)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124352013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ThreatVectors: contextual workflows and visualizations for rapid cyber event triage 威胁向量:上下文工作流和可视化快速网络事件分类
S. Miserendino, Corey Maynard, Jacob Davis
Cyber security operations face a daily flood of security events generated by automated security tools and analytics. These events must be rapidly and accurately triaged to remove false positives and focus investigations on those presenting the greatest risks to the enterprise and requiring immediate remediation. We introduce ThreatVectors as a contextual triage workflow and event visualization tool to aid operators in event triage. ThreatVectors use a streaming event processing framework for event correlation, aggregation and prioritization based on user definable event collections and a cyber-triage domain specific language. Triage work progress is shown using a novel progress bar matrix. Event collection visualization includes abstract event thumbnails for event overview and a dynamic filtering mechanism based on metafield hierarchies. Bulk adjudication of filtered event views and event clusters is supported. User testing on large enterprise networks indicates the approach has significant potential for aiding in identifying multievent campaigns, supporting collaborative triage and reducing total time spent triaging events.
网络安全运营每天都面临着由自动化安全工具和分析产生的大量安全事件。必须快速准确地对这些事件进行分类,以消除误报,并将调查重点放在那些对企业构成最大风险并需要立即补救的事件上。我们引入了ThreatVectors作为一个上下文分类工作流程和事件可视化工具,以帮助操作员进行事件分类。基于用户可定义的事件集合和网络分类领域特定语言,ThreatVectors使用流事件处理框架进行事件关联、聚合和优先级排序。分诊工作进度显示使用一个新的进度条矩阵。事件集合可视化包括用于事件概述的抽象事件缩略图和基于元字段层次结构的动态过滤机制。支持对过滤后的事件视图和事件集群进行批量裁决。在大型企业网络上的用户测试表明,该方法在帮助识别多事件活动、支持协作分类和减少分类事件所花费的总时间方面具有很大的潜力。
{"title":"ThreatVectors: contextual workflows and visualizations for rapid cyber event triage","authors":"S. Miserendino, Corey Maynard, Jacob Davis","doi":"10.1109/CYBERINCIDENT.2017.8054637","DOIUrl":"https://doi.org/10.1109/CYBERINCIDENT.2017.8054637","url":null,"abstract":"Cyber security operations face a daily flood of security events generated by automated security tools and analytics. These events must be rapidly and accurately triaged to remove false positives and focus investigations on those presenting the greatest risks to the enterprise and requiring immediate remediation. We introduce ThreatVectors as a contextual triage workflow and event visualization tool to aid operators in event triage. ThreatVectors use a streaming event processing framework for event correlation, aggregation and prioritization based on user definable event collections and a cyber-triage domain specific language. Triage work progress is shown using a novel progress bar matrix. Event collection visualization includes abstract event thumbnails for event overview and a dynamic filtering mechanism based on metafield hierarchies. Bulk adjudication of filtered event views and event clusters is supported. User testing on large enterprise networks indicates the approach has significant potential for aiding in identifying multievent campaigns, supporting collaborative triage and reducing total time spent triaging events.","PeriodicalId":298850,"journal":{"name":"2017 International Conference On Cyber Incident Response, Coordination, Containment & Control (Cyber Incident)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126784236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security operations centre: situation awareness, threat intelligence and cybercrime 安全行动中心:态势感知、威胁情报和网络犯罪
Cyril Onwubiko
There have been longitudinal advances in both cybersecurity and cyber-threats in recent years. With cybersecurity, for instance, there are now mechanisms to geographically locate an entity; there are those that can intercept most forms of electronic communications, and those that can recover most types of hidden images and data in electronic devices. The pace of change and advancements has equally been astronomical and astonishing. Technology refresh cycles have been slashed, and are now estimated to between 12 to 18 months, while the number of cyber users or entities has quadrupled in the last five years. These continuous changes have left an ever increasing gap between cybersecurity, that is, control mechanisms (a.k.a. safeguards) that help protect, detect, respond and recover organisational or national cyber investment, and cyber-threats, that is, threats that aim to exploit, breach or circumvent the cyber controls. This gap between cybersecurity on one hand and cyber-threats on the other hand appears to widen even further in areas with far greater financial rewards for the criminals, or nation state political gains. Exploits are now common and frequent, and impacts far much greater than before. This situation is further exacerbated by the lack of adequate and well deployed security operations centres to monitor organizational cyber investments.
近年来,网络安全和网络威胁都取得了纵向进展。以网络安全为例,现在有了定位实体地理位置的机制;有些可以拦截大多数形式的电子通信,有些可以恢复电子设备中大多数类型的隐藏图像和数据。变化和进步的速度同样是天文数字和惊人的。技术更新周期被大幅削减,目前估计为12至18个月,而网络用户或实体的数量在过去5年翻了两番。这些持续的变化使得网络安全(即帮助保护、检测、响应和恢复组织或国家网络投资的控制机制(又称保障措施))与网络威胁(即旨在利用、破坏或规避网络控制的威胁)之间的差距越来越大。网络安全与网络威胁之间的差距似乎在犯罪分子获得更大经济回报或国家政治利益的领域进一步扩大。漏洞利用现在很常见且频繁,影响也比以前大得多。由于缺乏足够和部署良好的安全行动中心来监测组织的网络投资,这种情况进一步恶化。
{"title":"Security operations centre: situation awareness, threat intelligence and cybercrime","authors":"Cyril Onwubiko","doi":"10.1109/socialmedia.2017.8057355","DOIUrl":"https://doi.org/10.1109/socialmedia.2017.8057355","url":null,"abstract":"There have been longitudinal advances in both cybersecurity and cyber-threats in recent years. With cybersecurity, for instance, there are now mechanisms to geographically locate an entity; there are those that can intercept most forms of electronic communications, and those that can recover most types of hidden images and data in electronic devices. The pace of change and advancements has equally been astronomical and astonishing. Technology refresh cycles have been slashed, and are now estimated to between 12 to 18 months, while the number of cyber users or entities has quadrupled in the last five years. These continuous changes have left an ever increasing gap between cybersecurity, that is, control mechanisms (a.k.a. safeguards) that help protect, detect, respond and recover organisational or national cyber investment, and cyber-threats, that is, threats that aim to exploit, breach or circumvent the cyber controls. This gap between cybersecurity on one hand and cyber-threats on the other hand appears to widen even further in areas with far greater financial rewards for the criminals, or nation state political gains. Exploits are now common and frequent, and impacts far much greater than before. This situation is further exacerbated by the lack of adequate and well deployed security operations centres to monitor organizational cyber investments.","PeriodicalId":298850,"journal":{"name":"2017 International Conference On Cyber Incident Response, Coordination, Containment & Control (Cyber Incident)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129027390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 International Conference On Cyber Incident Response, Coordination, Containment & Control (Cyber Incident)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1