首页 > 最新文献

Proceedings of the 17th International Conference on Availability, Reliability and Security最新文献

英文 中文
Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks 联合安全vs qos框架:优化5G网络入侵检测机制选择
Arash Bozorgchenani, Charilaos C. Zarakovitis, S. Chien, Heng-Siong Lim, Q. Ni, Antonios Gouglidis, Wissam Mallouli
The advent of 5G technology introduces new - and potentially undiscovered - cybersecurity challenges, with unforeseen impacts on our economy, society, and environment. Interestingly, Intrusion Detection Mechanisms (IDMs) can provide the necessary network monitoring to ensure - to a big extent - the detection of 5G-related cyberattacks. Yet, how to realize the attack surface of 5G networks with respect to the detected risks, and, consequently, how to optimize the cybersecurity levels of the network, remains an open critical challenge. In respect, this work focuses on deploying multiple distributed Security Agents (SAs) that can run different IDMs over various network components and proposes a cybersecurity mechanism for optimizing the network’s attack surface with respect to the Quality of Service (QoS). The proposed approach relies on a new closed-form utility function to describe the trade-off between cybersecurity and QoS and uses multi-objective optimization to improve the selection of each SA detection level. We demonstrate via simulations that before optimization, an increase in the detection level of SAs brings a direct decrease in QoS as more computational, bandwidth and monetary resources are utilized for IDM processing. Thereby, after optimization, we demonstrate that our mechanism can strike a balance between cybersecurity and QoS while showcasing the impact of the importance of different objectives of the joint optimization.
5G技术的出现带来了新的、可能未被发现的网络安全挑战,对我们的经济、社会和环境产生了不可预见的影响。有趣的是,入侵检测机制(idm)可以提供必要的网络监控,以确保在很大程度上检测到与5g相关的网络攻击。然而,如何根据检测到的风险实现5G网络的攻击面,从而优化网络的网络安全水平,仍然是一个悬而未决的关键挑战。在这方面,本工作侧重于部署多个分布式安全代理(sa),这些安全代理可以在各种网络组件上运行不同的idm,并提出了一种网络安全机制,用于优化与服务质量(QoS)相关的网络攻击面。提出的方法依赖于一个新的封闭形式效用函数来描述网络安全和QoS之间的权衡,并使用多目标优化来改进每个SA检测级别的选择。我们通过模拟证明,在优化之前,随着更多的计算、带宽和货币资源被用于IDM处理,sa检测水平的提高会直接降低QoS。因此,在优化后,我们证明了我们的机制可以在网络安全和QoS之间取得平衡,同时展示了联合优化的不同目标的重要性的影响。
{"title":"Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks","authors":"Arash Bozorgchenani, Charilaos C. Zarakovitis, S. Chien, Heng-Siong Lim, Q. Ni, Antonios Gouglidis, Wissam Mallouli","doi":"10.1145/3538969.3544480","DOIUrl":"https://doi.org/10.1145/3538969.3544480","url":null,"abstract":"The advent of 5G technology introduces new - and potentially undiscovered - cybersecurity challenges, with unforeseen impacts on our economy, society, and environment. Interestingly, Intrusion Detection Mechanisms (IDMs) can provide the necessary network monitoring to ensure - to a big extent - the detection of 5G-related cyberattacks. Yet, how to realize the attack surface of 5G networks with respect to the detected risks, and, consequently, how to optimize the cybersecurity levels of the network, remains an open critical challenge. In respect, this work focuses on deploying multiple distributed Security Agents (SAs) that can run different IDMs over various network components and proposes a cybersecurity mechanism for optimizing the network’s attack surface with respect to the Quality of Service (QoS). The proposed approach relies on a new closed-form utility function to describe the trade-off between cybersecurity and QoS and uses multi-objective optimization to improve the selection of each SA detection level. We demonstrate via simulations that before optimization, an increase in the detection level of SAs brings a direct decrease in QoS as more computational, bandwidth and monetary resources are utilized for IDM processing. Thereby, after optimization, we demonstrate that our mechanism can strike a balance between cybersecurity and QoS while showcasing the impact of the importance of different objectives of the joint optimization.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124693534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Rumor and clickbait detection by combining information divergence measures and deep learning techniques 结合信息发散度量和深度学习技术的谣言和标题党检测
Christian Oliva, Ignacio Palacio Marín, L. F. Lago-Fernández, David Arroyo
In this article we address the challenge of detecting the generation and spreading of misleading information in the specific scenario of clickbait. Our contribution consists of a methodology that combines a deep neural network and an information divergence measure to overcome the limitations of deep learning techniques in this scenario. This analysis is conducted by considering a clickbait challenge dataset. We realise that the construction of the dataset used to study this kind of problems dramatically affects the performance of the model and, thus, its selection. Since clickbait is a result of the inconsistency between headlines and content, we integrate a divergence measure as a layer of a deep learning model. The resulting model overcomes the limitations of conventional machine learning and deep learning models in clickbait detection.
在这篇文章中,我们解决了在点击诱饵的特定场景中检测误导性信息的产生和传播的挑战。我们的贡献包括一种结合了深度神经网络和信息发散度量的方法,以克服这种情况下深度学习技术的局限性。这个分析是通过考虑一个标题党挑战数据集来进行的。我们意识到,用于研究这类问题的数据集的构造极大地影响了模型的性能,从而影响了它的选择。由于标题党是标题和内容不一致的结果,我们将发散度量作为深度学习模型的一层。由此产生的模型克服了传统机器学习和深度学习模型在标题党检测中的局限性。
{"title":"Rumor and clickbait detection by combining information divergence measures and deep learning techniques","authors":"Christian Oliva, Ignacio Palacio Marín, L. F. Lago-Fernández, David Arroyo","doi":"10.1145/3538969.3543791","DOIUrl":"https://doi.org/10.1145/3538969.3543791","url":null,"abstract":"In this article we address the challenge of detecting the generation and spreading of misleading information in the specific scenario of clickbait. Our contribution consists of a methodology that combines a deep neural network and an information divergence measure to overcome the limitations of deep learning techniques in this scenario. This analysis is conducted by considering a clickbait challenge dataset. We realise that the construction of the dataset used to study this kind of problems dramatically affects the performance of the model and, thus, its selection. Since clickbait is a result of the inconsistency between headlines and content, we integrate a divergence measure as a layer of a deep learning model. The resulting model overcomes the limitations of conventional machine learning and deep learning models in clickbait detection.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128605785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fraudulent Activities in the Cyber Realm: DEFRAUDify Project: Fraudulent Activities in the Cyber Realm: DEFRAUDify Project 网络领域的欺诈活动:DEFRAUDify项目:网络领域的欺诈活动:DEFRAUDify项目
Razvan-Alexandru Bratulescu, Robert-Ionut Vatasoiu, Sorina-Andreea Mitroi, G. Suciu, Mari-Anais Sachian, Daniel-Marian Dutu, Serban-Emanuel Calescu
The increase in the number of Internet users has also led to an increase in activities leading to a cyber threat and fraud intelligence. These activities include the use of the Dark Web for coordination and virtual currencies for funding. This article will present the main methods of cyber-attacks and crimes used nowadays, and how they can be prevented by using tools specialized in monitoring transactions with virtual currencies and detecting web pages that pose a threat to users. The tools that will be described in this article are Graphsense used to analyze virtual currency activities and SpiderFoot used to identify Cyber Threat, Attack Surfaces, Security Assessments and Asset Discovery.
互联网用户数量的增加也导致了导致网络威胁和欺诈情报活动的增加。这些活动包括使用暗网进行协调,使用虚拟货币进行融资。本文将介绍目前使用的网络攻击和犯罪的主要方法,以及如何通过使用专门监控虚拟货币交易的工具和检测对用户构成威胁的网页来防止它们。本文将介绍用于分析虚拟货币活动的Graphsense工具和用于识别网络威胁、攻击面、安全评估和资产发现的SpiderFoot工具。
{"title":"Fraudulent Activities in the Cyber Realm: DEFRAUDify Project: Fraudulent Activities in the Cyber Realm: DEFRAUDify Project","authors":"Razvan-Alexandru Bratulescu, Robert-Ionut Vatasoiu, Sorina-Andreea Mitroi, G. Suciu, Mari-Anais Sachian, Daniel-Marian Dutu, Serban-Emanuel Calescu","doi":"10.1145/3538969.3544434","DOIUrl":"https://doi.org/10.1145/3538969.3544434","url":null,"abstract":"The increase in the number of Internet users has also led to an increase in activities leading to a cyber threat and fraud intelligence. These activities include the use of the Dark Web for coordination and virtual currencies for funding. This article will present the main methods of cyber-attacks and crimes used nowadays, and how they can be prevented by using tools specialized in monitoring transactions with virtual currencies and detecting web pages that pose a threat to users. The tools that will be described in this article are Graphsense used to analyze virtual currency activities and SpiderFoot used to identify Cyber Threat, Attack Surfaces, Security Assessments and Asset Discovery.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130843696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
BISCUIT - Blockchain Security Incident Reporting based on Human Observations 基于人类观察的区块链安全事件报告
B. Putz, Manfred Vielberth, G. Pernul
Security incidents in blockchain-based systems are frequent nowadays, which calls for more structured efforts in incident reporting and response. To improve the current status quo of reporting incidents on blogs and social media, we propose a decentralized incident reporting and discussion system. Our approach guides users (security novices) towards a classification of their observations using a tiered taxonomy of blockchain incidents. Questions based on previous incidents interactively support the classification. Post submission a security incident response committee then discusses these observations on our decentralized platform to decide on an appropriate response. For evaluation, we implement our model as a decentralized application and demonstrate its practical suitability in a preliminary user study.
如今,基于区块链的系统中的安全事件频繁发生,这需要在事件报告和响应方面做出更结构化的努力。为了改善博客和社交媒体上事件报告的现状,我们提出了一个分散的事件报告和讨论系统。我们的方法指导用户(安全新手)使用区块链事件的分层分类法对他们的观察进行分类。基于先前事件的问题交互式地支持分类。提交后,安全事件响应委员会然后在我们的分散平台上讨论这些观察结果,以决定适当的响应。为了进行评估,我们将模型实现为分散的应用程序,并在初步用户研究中证明其实际适用性。
{"title":"BISCUIT - Blockchain Security Incident Reporting based on Human Observations","authors":"B. Putz, Manfred Vielberth, G. Pernul","doi":"10.1145/3538969.3538984","DOIUrl":"https://doi.org/10.1145/3538969.3538984","url":null,"abstract":"Security incidents in blockchain-based systems are frequent nowadays, which calls for more structured efforts in incident reporting and response. To improve the current status quo of reporting incidents on blogs and social media, we propose a decentralized incident reporting and discussion system. Our approach guides users (security novices) towards a classification of their observations using a tiered taxonomy of blockchain incidents. Questions based on previous incidents interactively support the classification. Post submission a security incident response committee then discusses these observations on our decentralized platform to decide on an appropriate response. For evaluation, we implement our model as a decentralized application and demonstrate its practical suitability in a preliminary user study.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122327719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introducing Quantum Computing in Mobile Malware Detection 量子计算在移动恶意软件检测中的应用
Giovanni Ciaramella, Giacomo Iadarola, F. Mercaldo, Marco Storto, A. Santone, Fabio Martinelli
Mobile malware are increasing their complexity to be able to evade the current detection mechanism by gathering our sensitive and private information. For this reason, an active research field is represented by malware detection, with a great effort in the development of deep learning models starting from a set of malicious and legitimate applications. The recent introduction of quantum computing made possible quantum machine learning i.e., the integration of quantum algorithms within machine learning algorithms. In this paper, we propose a comparison between several deep learning models, by taking into account also a hybrid quantum malware detector. We explore the effectiveness of different architectures for malicious family detection in the Android environment: LeNet, AlexNet, a Convolutional Neural Network model designed by authors, VGG16 and a Hybrid Quantum Convolutional Neural Network i.e., a model where the first layer is a quantum convolution that uses transformations in circuits to simulate the behavior of a quantum computer. Experiments performed on a real-world dataset composed of 8446 Android malicious and legitimate applications allow us to compare the various models, with particular regard to the quantum model concerning the other ones.
移动恶意软件正在增加其复杂性,以便能够通过收集我们的敏感和私人信息来逃避当前的检测机制。因此,恶意软件检测是一个活跃的研究领域,人们从一组恶意和合法的应用程序开始,努力开发深度学习模型。最近引入的量子计算使量子机器学习成为可能,即在机器学习算法中集成量子算法。在本文中,我们提出了几种深度学习模型之间的比较,同时考虑了混合量子恶意软件检测器。我们探索了Android环境中恶意家族检测的不同架构的有效性:LeNet, AlexNet,作者设计的卷积神经网络模型,VGG16和混合量子卷积神经网络,即第一层是量子卷积的模型,使用电路中的变换来模拟量子计算机的行为。在由8446个Android恶意和合法应用程序组成的真实数据集上进行的实验使我们能够比较各种模型,特别是关于其他模型的量子模型。
{"title":"Introducing Quantum Computing in Mobile Malware Detection","authors":"Giovanni Ciaramella, Giacomo Iadarola, F. Mercaldo, Marco Storto, A. Santone, Fabio Martinelli","doi":"10.1145/3538969.3543816","DOIUrl":"https://doi.org/10.1145/3538969.3543816","url":null,"abstract":"Mobile malware are increasing their complexity to be able to evade the current detection mechanism by gathering our sensitive and private information. For this reason, an active research field is represented by malware detection, with a great effort in the development of deep learning models starting from a set of malicious and legitimate applications. The recent introduction of quantum computing made possible quantum machine learning i.e., the integration of quantum algorithms within machine learning algorithms. In this paper, we propose a comparison between several deep learning models, by taking into account also a hybrid quantum malware detector. We explore the effectiveness of different architectures for malicious family detection in the Android environment: LeNet, AlexNet, a Convolutional Neural Network model designed by authors, VGG16 and a Hybrid Quantum Convolutional Neural Network i.e., a model where the first layer is a quantum convolution that uses transformations in circuits to simulate the behavior of a quantum computer. Experiments performed on a real-world dataset composed of 8446 Android malicious and legitimate applications allow us to compare the various models, with particular regard to the quantum model concerning the other ones.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121501655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Image-based Neural Network Models for Malware Traffic Classification using PCAP to Picture Conversion 基于图像神经网络模型的恶意软件流量分类使用PCAP到图片转换
Georgios Agrafiotis, Eftychia Makri, Ioannis Flionis, Antonios Lalas, K. Votis, D. Tzovaras
Traffic categorization is considered of paramount importance in the network security sector, as well as the first stage in network anomaly detection, or in a network-based intrusion detection system (IDS). This paper introduces an artificial intelligence (AI) network traffic classification pipeline, including the employment of state-of-the-art image-based neural network models, namely Vision Transformers (ViT) and Convolutional Neural Networks (CNN), whereas the primary element of this pipeline is the transformation of raw traffic data into grayscale pictures introducing a properly developed IDS-Vision Toolkit as well. This approach extracts characteristics from network traffic data without requiring domain expertise and could be easily adapted to new network protocols and technologies (i.e. 5G). Furthermore, the proposed method was tested on the CIC-IDS-2017 dataset and compared to a well-known feature extraction strategy on the same dataset. Finally, it surpasses all suggested binary classification algorithms for the CIC-IDS-2017 dataset to the best of our knowledge, paving the path for further exploitation in the 5G domain to successfully address related cybersecurity challenges.
流量分类在网络安全领域中被认为是至关重要的,也是网络异常检测或基于网络的入侵检测系统(IDS)的第一步。本文介绍了一种人工智能(AI)网络流量分类管道,包括使用最先进的基于图像的神经网络模型,即视觉变形器(Vision transformer, ViT)和卷积神经网络(Convolutional neural Networks, CNN),而该管道的主要元素是将原始流量数据转换为灰度图像,并引入适当开发的IDS-Vision Toolkit。这种方法从网络流量数据中提取特征,而不需要领域专业知识,可以很容易地适应新的网络协议和技术(即5G)。此外,在CIC-IDS-2017数据集上对该方法进行了测试,并与同一数据集上的知名特征提取策略进行了比较。最后,据我们所知,它超越了CIC-IDS-2017数据集的所有建议的二元分类算法,为在5G领域的进一步开发铺平了道路,从而成功解决相关的网络安全挑战。
{"title":"Image-based Neural Network Models for Malware Traffic Classification using PCAP to Picture Conversion","authors":"Georgios Agrafiotis, Eftychia Makri, Ioannis Flionis, Antonios Lalas, K. Votis, D. Tzovaras","doi":"10.1145/3538969.3544473","DOIUrl":"https://doi.org/10.1145/3538969.3544473","url":null,"abstract":"Traffic categorization is considered of paramount importance in the network security sector, as well as the first stage in network anomaly detection, or in a network-based intrusion detection system (IDS). This paper introduces an artificial intelligence (AI) network traffic classification pipeline, including the employment of state-of-the-art image-based neural network models, namely Vision Transformers (ViT) and Convolutional Neural Networks (CNN), whereas the primary element of this pipeline is the transformation of raw traffic data into grayscale pictures introducing a properly developed IDS-Vision Toolkit as well. This approach extracts characteristics from network traffic data without requiring domain expertise and could be easily adapted to new network protocols and technologies (i.e. 5G). Furthermore, the proposed method was tested on the CIC-IDS-2017 dataset and compared to a well-known feature extraction strategy on the same dataset. Finally, it surpasses all suggested binary classification algorithms for the CIC-IDS-2017 dataset to the best of our knowledge, paving the path for further exploitation in the 5G domain to successfully address related cybersecurity challenges.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131469899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improving Network, Data and Application Security for SMEs 提高中小企业网络、数据和应用安全
C. Tselios, Ilias Politis, C.K. Xenakis
The evolution of Information and Communications Technology and Cloud Computing, combined with the advent of novel telecommunication frameworks such as 5G, have introduced the notion of ubiquitous connectivity combined with a seemingly vast pool of resources, storage and services. This immense transformation introduced new types of security threats mostly due to the significant increase of the attack surface, which can now be compromised by malicious users. Despite the fact that malicious attacks constantly become more and more sophisticated, SMEs and public administrations remain reluctant to invest in cybersecurity since they operate on a limited budget and are mostly focused in time to market and cost minimization. The purpose of this book chapter is to provide an overview on how the most common network-related cybersecurity attacks are orchestrated, which are the systems and services they affect the most as well as present specific design principles and guidelines for crafting platforms and frameworks capable of mitigating such attacks and ensure a certain level of secure operation.
信息通信技术和云计算的发展,再加上5G等新型电信框架的出现,引入了无处不在的连接概念,并结合了看似巨大的资源、存储和服务池。这种巨大的转变引入了新的安全威胁类型,主要是由于攻击面显著增加,现在可以被恶意用户破坏。尽管恶意攻击不断变得越来越复杂,但中小企业和公共管理部门仍然不愿意投资网络安全,因为他们的预算有限,主要关注的是及时上市和成本最小化。本章的目的是概述最常见的与网络相关的网络安全攻击是如何编排的,这些攻击是它们影响最大的系统和服务,以及为制作能够减轻此类攻击并确保一定程度的安全操作的平台和框架提供具体的设计原则和指导方针。
{"title":"Improving Network, Data and Application Security for SMEs","authors":"C. Tselios, Ilias Politis, C.K. Xenakis","doi":"10.1145/3538969.3544426","DOIUrl":"https://doi.org/10.1145/3538969.3544426","url":null,"abstract":"The evolution of Information and Communications Technology and Cloud Computing, combined with the advent of novel telecommunication frameworks such as 5G, have introduced the notion of ubiquitous connectivity combined with a seemingly vast pool of resources, storage and services. This immense transformation introduced new types of security threats mostly due to the significant increase of the attack surface, which can now be compromised by malicious users. Despite the fact that malicious attacks constantly become more and more sophisticated, SMEs and public administrations remain reluctant to invest in cybersecurity since they operate on a limited budget and are mostly focused in time to market and cost minimization. The purpose of this book chapter is to provide an overview on how the most common network-related cybersecurity attacks are orchestrated, which are the systems and services they affect the most as well as present specific design principles and guidelines for crafting platforms and frameworks capable of mitigating such attacks and ensure a certain level of secure operation.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131594601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Security and Scalability in Smart Grids using Blockchain Technologies 使用区块链技术提高智能电网的安全性和可扩展性
Mandana Falahi, A. Vasilățeanu, N. Goga, G. Suciu, Mari-Anais Sachian, Robert Florescu, Ștefan-Daniel Stanciu
In the current industrial century, smart grid is one of the technologies that has been proposed for efficient and quality distribution of electricity. However, this technology is exposed to many security threats and vulnerabilities. These challenges have led to the development of advanced technologies and sustainable solutions to make smart grids more secure and reliable. Blockchain is one of the recent technologies that has attracted a lot of attention in various applications, including smart grids. SealedGRID is a project designed, analyzed and implemented with the aim of providing a scalable and reliable Smart Grid security platform based on blockchain. In this paper, we present a scalable and secure solution for smart grids using Hyperledger Fabric and MQTT.
在当今工业世纪,智能电网是为实现高效、高质量的电力分配而提出的技术之一。然而,这种技术暴露在许多安全威胁和漏洞之下。这些挑战促使了先进技术和可持续解决方案的发展,使智能电网更加安全和可靠。区块链是近年来在包括智能电网在内的各种应用中引起广泛关注的技术之一。SealedGRID是一个设计、分析和实施的项目,旨在提供一个基于区块链的可扩展和可靠的智能电网安全平台。在本文中,我们提出了一种使用Hyperledger Fabric和MQTT的可扩展和安全的智能电网解决方案。
{"title":"Improving Security and Scalability in Smart Grids using Blockchain Technologies","authors":"Mandana Falahi, A. Vasilățeanu, N. Goga, G. Suciu, Mari-Anais Sachian, Robert Florescu, Ștefan-Daniel Stanciu","doi":"10.1145/3538969.3544441","DOIUrl":"https://doi.org/10.1145/3538969.3544441","url":null,"abstract":"In the current industrial century, smart grid is one of the technologies that has been proposed for efficient and quality distribution of electricity. However, this technology is exposed to many security threats and vulnerabilities. These challenges have led to the development of advanced technologies and sustainable solutions to make smart grids more secure and reliable. Blockchain is one of the recent technologies that has attracted a lot of attention in various applications, including smart grids. SealedGRID is a project designed, analyzed and implemented with the aim of providing a scalable and reliable Smart Grid security platform based on blockchain. In this paper, we present a scalable and secure solution for smart grids using Hyperledger Fabric and MQTT.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132800298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Forensic analysis of Tor in Windows environment: A case study Windows环境下Tor的取证分析:一个案例研究
Vaia-Maria Angeli, Ahmad Atamli-Reineh, Erisa Karafili
The Tor browser is a popular tool that is used by many users around the world. The browser is common among cyber criminals who use the tool to hide their activities. Until now, little research has been conducted by forensics researchers on the Tor browser, its application, and the data that can be obtained from the artefacts generated from its execution. In this work, we present a forensics analysis of the footprint left by the Tor application in the Windows environment. Our analysis focuses on three critical areas that are examined: network, memory, and hard disk. We provide a methodology that allows a structured forensic investigation. In this work, we examine multiple tools’ abilities in obtaining artefacts. The artefacts were identified not only when the Tor browser was running, but also when it was closed and uninstalled. We provide a methodology to analyse Tor applications with a focused case study of the Tor browser, allowing investigators to analyse Tor browsers and reproduce our results.
Tor浏览器是一个受欢迎的工具,被世界各地的许多用户使用。该浏览器在网络犯罪分子中很常见,他们使用该工具来隐藏自己的活动。到目前为止,法医研究人员对Tor浏览器、它的应用程序以及从它的执行中产生的工件中可以获得的数据进行了很少的研究。在这项工作中,我们对Tor应用程序在Windows环境中留下的足迹进行了取证分析。我们的分析主要集中在三个关键领域:网络、内存和硬盘。我们提供一种方法,允许结构化的法医调查。在这项工作中,我们检查了多种工具在获取工件方面的能力。这些产物不仅在Tor浏览器运行时被识别,而且在它被关闭和卸载时也被识别。我们提供了一种方法,通过对Tor浏览器的重点案例研究来分析Tor应用程序,允许调查人员分析Tor浏览器并复制我们的结果。
{"title":"Forensic analysis of Tor in Windows environment: A case study","authors":"Vaia-Maria Angeli, Ahmad Atamli-Reineh, Erisa Karafili","doi":"10.1145/3538969.3543808","DOIUrl":"https://doi.org/10.1145/3538969.3543808","url":null,"abstract":"The Tor browser is a popular tool that is used by many users around the world. The browser is common among cyber criminals who use the tool to hide their activities. Until now, little research has been conducted by forensics researchers on the Tor browser, its application, and the data that can be obtained from the artefacts generated from its execution. In this work, we present a forensics analysis of the footprint left by the Tor application in the Windows environment. Our analysis focuses on three critical areas that are examined: network, memory, and hard disk. We provide a methodology that allows a structured forensic investigation. In this work, we examine multiple tools’ abilities in obtaining artefacts. The artefacts were identified not only when the Tor browser was running, but also when it was closed and uninstalled. We provide a methodology to analyse Tor applications with a focused case study of the Tor browser, allowing investigators to analyse Tor browsers and reproduce our results.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115049397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Quantitative Assessment of the Detection Performance of Web Vulnerability Scanners Web漏洞扫描器检测性能的定量评估
Emma Lavens, Pieter Philippaerts, W. Joosen
Software developers use web application vulnerability scanners to automatically identify security weaknesses in their web applications. The scanners inspect source code or analyze the running application, and look for specific vulnerability types. While it can be expected that a scanner will not discover every vulnerability, no information is available on the expected efficacy of currently available vulnerability scanners for a given vulnerability type. We present an analysis of 24 web vulnerability scanners and determine their effectiveness on 11 vulnerability types. Our study offers insights into the trade-offs when selecting a specific type of scanner. We show that for some vulnerability types, most vulnerability scanners perform poorly.
软件开发人员使用web应用程序漏洞扫描器来自动识别其web应用程序中的安全弱点。扫描器检查源代码或分析正在运行的应用程序,并查找特定的漏洞类型。虽然可以预期扫描器不会发现每个漏洞,但是没有关于当前可用漏洞扫描器对给定漏洞类型的预期功效的信息。我们对24个web漏洞扫描器进行了分析,并确定了它们对11种漏洞类型的有效性。我们的研究提供了选择特定类型扫描仪时的权衡的见解。我们展示了对于某些漏洞类型,大多数漏洞扫描器表现不佳。
{"title":"A Quantitative Assessment of the Detection Performance of Web Vulnerability Scanners","authors":"Emma Lavens, Pieter Philippaerts, W. Joosen","doi":"10.1145/3538969.3544416","DOIUrl":"https://doi.org/10.1145/3538969.3544416","url":null,"abstract":"Software developers use web application vulnerability scanners to automatically identify security weaknesses in their web applications. The scanners inspect source code or analyze the running application, and look for specific vulnerability types. While it can be expected that a scanner will not discover every vulnerability, no information is available on the expected efficacy of currently available vulnerability scanners for a given vulnerability type. We present an analysis of 24 web vulnerability scanners and determine their effectiveness on 11 vulnerability types. Our study offers insights into the trade-offs when selecting a specific type of scanner. We show that for some vulnerability types, most vulnerability scanners perform poorly.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115085427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 17th International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1