首页 > 最新文献

Proceedings of the 17th International Conference on Availability, Reliability and Security最新文献

英文 中文
Security Maturity Self-Assessment Framework for Software Development Lifecycle 软件开发生命周期的安全成熟度自评估框架
Raluca Brasoveanu, Yusuf Karabulut, Ivan Pashchenko
Vulnerable software often originates from insufficient attention to security in the software development lifecycle. However, current maturity models provide limited support for the teams to assess the security maturity of their software development practices. In this paper, we propose a security maturity self-assessment framework for software development lifecycle. The proposed framework is based on three well-known and industry-accepted models that focus on increasing the security maturity of software products: OWASP DevSecOps Maturity Model (DSOMM), OWASP Software assurance Maturity Model (SAMM), and Building Security In Maturity Model (BSIMM). The preliminary validation with software developers suggests that the proposed framework helps teams to understand the security posture of their software products and to identify which security practices need improvements.
易受攻击的软件通常源于软件开发生命周期中对安全性的关注不足。然而,当前的成熟度模型为团队评估其软件开发实践的安全成熟度提供了有限的支持。在本文中,我们提出了一个软件开发生命周期的安全成熟度自评估框架。所提出的框架基于三个众所周知且业界认可的模型,这些模型的重点是提高软件产品的安全成熟度:OWASP DevSecOps成熟度模型(DSOMM)、OWASP软件保证成熟度模型(SAMM)和构建安全成熟度模型(BSIMM)。与软件开发人员进行的初步验证表明,所建议的框架有助于团队理解其软件产品的安全状态,并确定哪些安全实践需要改进。
{"title":"Security Maturity Self-Assessment Framework for Software Development Lifecycle","authors":"Raluca Brasoveanu, Yusuf Karabulut, Ivan Pashchenko","doi":"10.1145/3538969.3543806","DOIUrl":"https://doi.org/10.1145/3538969.3543806","url":null,"abstract":"Vulnerable software often originates from insufficient attention to security in the software development lifecycle. However, current maturity models provide limited support for the teams to assess the security maturity of their software development practices. In this paper, we propose a security maturity self-assessment framework for software development lifecycle. The proposed framework is based on three well-known and industry-accepted models that focus on increasing the security maturity of software products: OWASP DevSecOps Maturity Model (DSOMM), OWASP Software assurance Maturity Model (SAMM), and Building Security In Maturity Model (BSIMM). The preliminary validation with software developers suggests that the proposed framework helps teams to understand the security posture of their software products and to identify which security practices need improvements.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114618594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A novel, refined dataset for real-time Network Intrusion Detection 一种新颖、精细的实时网络入侵检测数据集
Mikołaj Komisarek, M. Pawlicki, Marian Mihailescu, Darius Mihai, M. Cărăbaş, R. Kozik, M. Choraś
In this day and age of widespread Internet access, more and more aspects of the economy are becoming dependent on various aspects of network technologies. Cybercrimes are on the rise and massive numbers of network security breaches occur every year. This paper presents network data collected in the Netflow format and its application to detect network attacks. The paper proposes a refined, real-world dataset collected from an academic network. The dataset is a direct result from the experience gained by working on and with the SIMARGL2021 dataset. The applicability of the new dataset is demonstrated on several machine learning algorithms. This novel dataset is open-sourced for researchers to download and use in scientific work.
在这个互联网普及的时代,越来越多的经济领域依赖于网络技术的各个方面。网络犯罪呈上升趋势,每年都会发生大量的网络安全漏洞。本文介绍了以Netflow格式采集的网络数据及其在网络攻击检测中的应用。本文提出了一个从学术网络中收集的精炼的真实数据集。该数据集是通过使用simmargl2021数据集获得的经验的直接结果。在几种机器学习算法上证明了新数据集的适用性。这个新颖的数据集是开源的,供研究人员下载并用于科学工作。
{"title":"A novel, refined dataset for real-time Network Intrusion Detection","authors":"Mikołaj Komisarek, M. Pawlicki, Marian Mihailescu, Darius Mihai, M. Cărăbaş, R. Kozik, M. Choraś","doi":"10.1145/3538969.3544486","DOIUrl":"https://doi.org/10.1145/3538969.3544486","url":null,"abstract":"In this day and age of widespread Internet access, more and more aspects of the economy are becoming dependent on various aspects of network technologies. Cybercrimes are on the rise and massive numbers of network security breaches occur every year. This paper presents network data collected in the Netflow format and its application to detect network attacks. The paper proposes a refined, real-world dataset collected from an academic network. The dataset is a direct result from the experience gained by working on and with the SIMARGL2021 dataset. The applicability of the new dataset is demonstrated on several machine learning algorithms. This novel dataset is open-sourced for researchers to download and use in scientific work.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116859511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Owner, the Provider and the Subcontractors: How to Handle Accountability and Liability Management for 5G End to End Service 业主、提供商和分包商:如何处理5G端到端服务的问责和责任管理
Chrystel Gaber, Ghada Arfaoui, Y. Carlinet, N. Perrot, Laurent Valleyre, M. Lacoste, Jean-Philippe Wary, Yacine Anser, Rafal Artych, Aleksandra Podlasek, Edgardo Montes de Oca, Vinh Hoa La, Vincent Lefebvre, Gürkan Gür
The adoption of 5G services depends on the capacity to provide high-value services. In addition to enhanced performance, the capacity to deliver Security Service Level Agreements (SSLAs) and demonstrate their fulfillment would be a great incentive for the adoption of 5G services for critical 5G Verticals (e.g., service suppliers like Energy or Intelligent Transportation Systems) subject to specific industrial safety, security or service level rules and regulations (e.g., NIS or SEVESO Directives). Yet, responsibilities may be difficult to track and demonstrate because 5G infrastructures are interconnected and complex, which is a challenge anticipated to be exacerbated in future 6G networks. This paper describes a demonstrator and a use case that shows how 5G Service Providers can deliver SSLAs to their customers (Service Owners) by leveraging a set of network enablers developed in the INSPIRE-5Gplus project to manage their accountability, liability and trust placed in subcomponents of a service (subcontractors). The elaborated enablers are in particular a novel sTakeholder Responsibility, AccountabIity and Liability deScriptor (TRAILS), a Liability-Aware Service Management Referencing Service (LASM-RS), an anomaly detection tool (IoT-MMT), a Root Cause Analysis tool (IoT-RCA), two Remote Attestation mechanisms (Systemic and Deep Attestation), and two Security-by-Orchestration enablers (one for the 5G Core and one for the MEC).
5G业务的采用取决于提供高价值业务的能力。除了增强性能外,交付安全服务水平协议(SSLAs)并证明其履行的能力将极大地激励关键5G垂直行业(例如,能源或智能交通系统等服务供应商)采用5G服务,但须遵守特定的工业安全、安全或服务水平规则和法规(例如NIS或SEVESO指令)。然而,由于5G基础设施相互关联且复杂,责任可能难以追踪和证明,这是未来6G网络预计将加剧的挑战。本文描述了一个演示和一个用例,展示了5G服务提供商如何通过利用INSPIRE-5Gplus项目中开发的一组网络使能器来管理其在服务子组件(分包商)中的问责制、责任和信任,从而向其客户(服务所有者)交付ssl。详细阐述的使能器特别是一个新颖的利益相关者责任、问责和责任描述符(TRAILS),一个责任感知服务管理参考服务(LASM-RS),一个异常检测工具(IoT-MMT),一个根本原因分析工具(IoT-RCA),两个远程认证机制(系统和深度认证),以及两个按业务流程安全使能器(一个用于5G核心,一个用于MEC)。
{"title":"The Owner, the Provider and the Subcontractors: How to Handle Accountability and Liability Management for 5G End to End Service","authors":"Chrystel Gaber, Ghada Arfaoui, Y. Carlinet, N. Perrot, Laurent Valleyre, M. Lacoste, Jean-Philippe Wary, Yacine Anser, Rafal Artych, Aleksandra Podlasek, Edgardo Montes de Oca, Vinh Hoa La, Vincent Lefebvre, Gürkan Gür","doi":"10.1145/3538969.3544465","DOIUrl":"https://doi.org/10.1145/3538969.3544465","url":null,"abstract":"The adoption of 5G services depends on the capacity to provide high-value services. In addition to enhanced performance, the capacity to deliver Security Service Level Agreements (SSLAs) and demonstrate their fulfillment would be a great incentive for the adoption of 5G services for critical 5G Verticals (e.g., service suppliers like Energy or Intelligent Transportation Systems) subject to specific industrial safety, security or service level rules and regulations (e.g., NIS or SEVESO Directives). Yet, responsibilities may be difficult to track and demonstrate because 5G infrastructures are interconnected and complex, which is a challenge anticipated to be exacerbated in future 6G networks. This paper describes a demonstrator and a use case that shows how 5G Service Providers can deliver SSLAs to their customers (Service Owners) by leveraging a set of network enablers developed in the INSPIRE-5Gplus project to manage their accountability, liability and trust placed in subcomponents of a service (subcontractors). The elaborated enablers are in particular a novel sTakeholder Responsibility, AccountabIity and Liability deScriptor (TRAILS), a Liability-Aware Service Management Referencing Service (LASM-RS), an anomaly detection tool (IoT-MMT), a Root Cause Analysis tool (IoT-RCA), two Remote Attestation mechanisms (Systemic and Deep Attestation), and two Security-by-Orchestration enablers (one for the 5G Core and one for the MEC).","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115467816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The cybersecurity-related ethical issues of cloud technology and how to avoid them 云技术的网络安全伦理问题以及如何避免这些问题
Aleksandra Pawlicka, M. Pawlicki, R. Renk, R. Kozik, M. Choraś
Nowadays, cloud technology is assuming immense significance, being treated as a critical infrastructure, and is also a buzzword. Nevertheless, the technology has also brought about a number of new adverse phenomena and threats; it has attracted criminals, as well. Whenever the questions of “good” and “bad” arise, the ethical issues arise alongside them; the cybersecurity of cloud technology is no exception. This paper deals with the ethical dilemmas of cloud technology. It discusses a collection of the ethical issues of the cloud technology presented from the perspective of cybersecurity, based on the state-of-the-art literature. The main contribution of this work is that it gathers, synthesizes and organises the cybersecurity-related ethical dilemmas of cloud technology, thus offering the most extensive collection thereof. In addition, the work presents a comprehensive list of recommendations and suggestions which may help solve or prevent these ethical issues, and are a good starting point for anyone designing an ethical cybersecurity strategy.
如今,云技术正在承担着巨大的意义,被视为关键的基础设施,也是一个流行语。然而,这项技术也带来了一些新的不利现象和威胁;它也吸引了罪犯。每当“好”与“坏”的问题出现时,伦理问题就会随之而来;云技术的网络安全也不例外。本文讨论了云技术的伦理困境。它讨论了从网络安全的角度提出的云技术伦理问题的集合,基于最先进的文献。这项工作的主要贡献在于它收集、综合和组织了与云技术有关的网络安全伦理困境,从而提供了最广泛的收集。此外,该工作还提出了一份全面的建议和建议清单,这些建议和建议可能有助于解决或防止这些道德问题,并且对于任何设计道德网络安全策略的人来说都是一个很好的起点。
{"title":"The cybersecurity-related ethical issues of cloud technology and how to avoid them","authors":"Aleksandra Pawlicka, M. Pawlicki, R. Renk, R. Kozik, M. Choraś","doi":"10.1145/3538969.3544456","DOIUrl":"https://doi.org/10.1145/3538969.3544456","url":null,"abstract":"Nowadays, cloud technology is assuming immense significance, being treated as a critical infrastructure, and is also a buzzword. Nevertheless, the technology has also brought about a number of new adverse phenomena and threats; it has attracted criminals, as well. Whenever the questions of “good” and “bad” arise, the ethical issues arise alongside them; the cybersecurity of cloud technology is no exception. This paper deals with the ethical dilemmas of cloud technology. It discusses a collection of the ethical issues of the cloud technology presented from the perspective of cybersecurity, based on the state-of-the-art literature. The main contribution of this work is that it gathers, synthesizes and organises the cybersecurity-related ethical dilemmas of cloud technology, thus offering the most extensive collection thereof. In addition, the work presents a comprehensive list of recommendations and suggestions which may help solve or prevent these ethical issues, and are a good starting point for anyone designing an ethical cybersecurity strategy.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114957237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Botnet Detection in the Internet of Things through All-in-one Deep Autoencoding 基于一体化深度自动编码的物联网僵尸网络检测
Marta Catillo, A. Pecchia, Umberto Villano
In the past years Internet of Things (IoT) has received increasing attention by academia and industry due to the potential use in several human activities; however, IoT devices are vulnerable to various types of attacks. Many existing intrusion detection proposals in the IoT leverage complex machine learning architectures, which may provide one separate model per device or per attack. These solutions are not suited to the dynamicity and scale of modern IoT environments. This paper proposes an initial analysis of the problem in the context of deep autoencoders and the detection of botnet attacks. Our findings, obtained by means of the N-BaIoT dataset, indicate that it is relatively easy to achieve impressive detection results by training-testing separate and minimal deep autoenconders on the top of the data individual IoT devices. More important, our all-in-one deep autoencoding proposal, which consists in training a single model with the benign traffic collected from different IoT devices, allows to preserve the overall detection performance obtained through separate autoencoders. The all-in-one model can pave the way for more scalable intrusion detection solutions in the context of IoT.
在过去的几年里,物联网(IoT)由于在一些人类活动中的潜在用途而受到学术界和工业界越来越多的关注;然而,物联网设备容易受到各种类型的攻击。物联网中许多现有的入侵检测建议利用复杂的机器学习架构,这可能为每个设备或每次攻击提供一个单独的模型。这些解决方案不适合现代物联网环境的动态性和规模。本文在深度自编码器和僵尸网络攻击检测的背景下对该问题进行了初步分析。我们通过N-BaIoT数据集获得的研究结果表明,通过在单个物联网设备的数据顶部训练测试独立和最小深度自动编码器,相对容易获得令人印象深刻的检测结果。更重要的是,我们的一体化深度自动编码方案,包括用从不同物联网设备收集的良性流量训练单个模型,允许保留通过单独的自编码器获得的整体检测性能。一体化模型可以为物联网背景下更具可扩展性的入侵检测解决方案铺平道路。
{"title":"Botnet Detection in the Internet of Things through All-in-one Deep Autoencoding","authors":"Marta Catillo, A. Pecchia, Umberto Villano","doi":"10.1145/3538969.3544460","DOIUrl":"https://doi.org/10.1145/3538969.3544460","url":null,"abstract":"In the past years Internet of Things (IoT) has received increasing attention by academia and industry due to the potential use in several human activities; however, IoT devices are vulnerable to various types of attacks. Many existing intrusion detection proposals in the IoT leverage complex machine learning architectures, which may provide one separate model per device or per attack. These solutions are not suited to the dynamicity and scale of modern IoT environments. This paper proposes an initial analysis of the problem in the context of deep autoencoders and the detection of botnet attacks. Our findings, obtained by means of the N-BaIoT dataset, indicate that it is relatively easy to achieve impressive detection results by training-testing separate and minimal deep autoenconders on the top of the data individual IoT devices. More important, our all-in-one deep autoencoding proposal, which consists in training a single model with the benign traffic collected from different IoT devices, allows to preserve the overall detection performance obtained through separate autoencoders. The all-in-one model can pave the way for more scalable intrusion detection solutions in the context of IoT.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124281152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness 面向态势感知的智能交通系统(ITS)访问控制策略的分布式实施
Tahir Ahmad, Umberto Morelli, Silvio Ranise
Intelligent Transport Systems (ITS) are crucial to support Situation Awareness (SA), which aims to keep a safe and efficient driving experience. While promising, ITS use for SA brings several security challenges, including enforcing access control policies in distributed environments with stringent computational constraints in terms of availability, consistency, and latency. Consequently, traditional mechanisms used to enforce authorization policies cannot be reused off-the-shelf but need to be carefully adapted to the particular requirements and minimize the overhead of access control enforcement. In this paper, we propose a distributed architecture for access control enforcement for ITS capable of satisfying the requirements of SA scenarios based on the idea of dynamically compiling a high-level specification of access control policies (written in the Attribute-Based Access Control model) into a set of low-level Access Control Lists that are easier to enforce. We discuss how to realize it by reusing well-known techniques developed in the field of distributed systems. To evaluate the applicability of the proposed approach, we build a prototype that we use to conduct an experimental evaluation in the context of two practical use case scenarios.
智能交通系统(ITS)对于支持态势感知(SA)至关重要,其目的是保持安全高效的驾驶体验。虽然前景很好,但将ITS用于SA也带来了一些安全挑战,包括在分布式环境中实施访问控制策略,这些环境在可用性、一致性和延迟方面具有严格的计算约束。因此,用于强制执行授权策略的传统机制不能现成地重用,而需要仔细调整以适应特定需求,并将访问控制强制的开销降至最低。在本文中,我们基于动态编译访问控制策略的高级规范(以基于属性的访问控制模型编写)为一组更容易执行的低级访问控制列表的思想,提出了一种用于ITS访问控制实施的分布式架构,该架构能够满足SA场景的需求。我们讨论了如何通过重用分布式系统领域中开发的知名技术来实现它。为了评估所建议的方法的适用性,我们构建了一个原型,用于在两个实际用例场景的上下文中进行实验评估。
{"title":"Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness","authors":"Tahir Ahmad, Umberto Morelli, Silvio Ranise","doi":"10.1145/3538969.3543792","DOIUrl":"https://doi.org/10.1145/3538969.3543792","url":null,"abstract":"Intelligent Transport Systems (ITS) are crucial to support Situation Awareness (SA), which aims to keep a safe and efficient driving experience. While promising, ITS use for SA brings several security challenges, including enforcing access control policies in distributed environments with stringent computational constraints in terms of availability, consistency, and latency. Consequently, traditional mechanisms used to enforce authorization policies cannot be reused off-the-shelf but need to be carefully adapted to the particular requirements and minimize the overhead of access control enforcement. In this paper, we propose a distributed architecture for access control enforcement for ITS capable of satisfying the requirements of SA scenarios based on the idea of dynamically compiling a high-level specification of access control policies (written in the Attribute-Based Access Control model) into a set of low-level Access Control Lists that are easier to enforce. We discuss how to realize it by reusing well-known techniques developed in the field of distributed systems. To evaluate the applicability of the proposed approach, we build a prototype that we use to conduct an experimental evaluation in the context of two practical use case scenarios.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130855052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Performance of Machine Learning based Detection of Network Steganography in Industrial Control Systems 提高工业控制系统中基于机器学习的网络隐写检测性能
T. Neubert, Antonio José Caballero Morcillo, C. Vielhauer
In view of the strong increase of targeted attacks on industrial control systems (ICS) of manufacturies and critical infrastructures, it can be noticed that for the concealment of communication, steganographic information hiding techniques become increasingly popular for attackers. Particularly in Advanced Persistent Threats, attackers focus on hiding network information flows between infected components from any possible detection mechanism in order to remain on the invaded system for as long as possible. In order to be able to detect these kinds of threats by hidden communication in future, defense concepts such as intrusion detection systems need to be supplemented by steganalytic detectors for ICS network traffic. First state-of-the-art detection mechanisms have been proposed and deliver decent but improvable results. This paper proposes a novel, convolutional neural network (CNN) based detection approach relying on a handcrafted feature space as CNN input layer. The detection approach is evaluated extensively in experiments. The evaluation results are compared to three state-of-the-art approaches in a laboratory ICS setup. We show that our novel approach is able to outperform all state-of-the-art approaches significantly. It delivers a performance of up to 94.3% correct classified test data samples.
鉴于针对制造业工业控制系统和关键基础设施的针对性攻击的强劲增长,可以注意到,为了隐藏通信,隐写信息隐藏技术越来越受到攻击者的欢迎。特别是在高级持续性威胁中,攻击者专注于隐藏受感染组件之间的网络信息流,以避免任何可能的检测机制,以便尽可能长时间地留在被入侵的系统上。为了能够在未来通过隐藏通信检测这类威胁,需要对ICS网络流量的隐写分析检测器来补充入侵检测系统等防御概念。首先,已经提出了最先进的检测机制,并提供了体面但可改进的结果。本文提出了一种新颖的基于卷积神经网络(CNN)的检测方法,该方法依赖于手工制作的特征空间作为CNN输入层。该检测方法在实验中得到了广泛的评价。评估结果与实验室ICS设置中的三种最先进的方法进行了比较。我们表明,我们的新方法能够明显优于所有最先进的方法。它提供了高达94.3%的正确分类测试数据样本的性能。
{"title":"Improving Performance of Machine Learning based Detection of Network Steganography in Industrial Control Systems","authors":"T. Neubert, Antonio José Caballero Morcillo, C. Vielhauer","doi":"10.1145/3538969.3544427","DOIUrl":"https://doi.org/10.1145/3538969.3544427","url":null,"abstract":"In view of the strong increase of targeted attacks on industrial control systems (ICS) of manufacturies and critical infrastructures, it can be noticed that for the concealment of communication, steganographic information hiding techniques become increasingly popular for attackers. Particularly in Advanced Persistent Threats, attackers focus on hiding network information flows between infected components from any possible detection mechanism in order to remain on the invaded system for as long as possible. In order to be able to detect these kinds of threats by hidden communication in future, defense concepts such as intrusion detection systems need to be supplemented by steganalytic detectors for ICS network traffic. First state-of-the-art detection mechanisms have been proposed and deliver decent but improvable results. This paper proposes a novel, convolutional neural network (CNN) based detection approach relying on a handcrafted feature space as CNN input layer. The detection approach is evaluated extensively in experiments. The evaluation results are compared to three state-of-the-art approaches in a laboratory ICS setup. We show that our novel approach is able to outperform all state-of-the-art approaches significantly. It delivers a performance of up to 94.3% correct classified test data samples.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128923488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assessing discrepancies between network traffic and privacy policies of public sector web services 评估公共部门网络服务的网络流量和隐私政策之间的差异
Timi Heino, Robin Carlsson, Sampsa Rauti, V. Leppänen
Online services are increasingly being used to complete everyday tasks, and ordinary users with very little technical knowledge have learned to use web services and applications. At the same time, many user applications are gradually moving from the traditional desktop environment to the web. Because of these developments, it is not surprising that user privacy has become a very important consideration when developing web services. In the current study, we assess the privacy of 34 web services provided and maintained by Finnish public sector bodies. We perform a network traffic analysis in order to find out what kind of personal data the studied services deliver to third party analytics services. We then take a look at the privacy policy documents of these web services and gauge their transparency and clarity by comparing their contents to the actual network data sent out by the web services. Our findings reveal numerous inconsistencies between what is said about handling personal data in the analyzed privacy policies and the actual traffic of the studied web services. Another prominent finding is the sheer amount of analytics services employed by the studied websites. We conclude that there is still an obvious need for web developers and public sector bodies to improve their awareness of existing privacy regulations and personal information their online services deliver to third parties. A lot of work also remains to be done in clearly and transparently communicating privacy-related matters to users.
在线服务被越来越多地用于完成日常任务,技术知识很少的普通用户已经学会了使用web服务和应用程序。与此同时,许多用户应用程序正逐渐从传统的桌面环境转向网络。由于这些发展,用户隐私成为开发web服务时非常重要的考虑因素也就不足为奇了。在当前的研究中,我们评估了芬兰公共部门机构提供和维护的34个网络服务的隐私。我们执行网络流量分析,以找出所研究的服务向第三方分析服务提供的个人数据类型。然后,我们查看这些web服务的隐私政策文档,并通过将其内容与web服务发送的实际网络数据进行比较来衡量其透明度和清晰度。我们的研究结果显示,在所分析的隐私政策中关于处理个人数据的说法与所研究的web服务的实际流量之间存在许多不一致之处。另一个突出的发现是,被研究的网站使用了大量的分析服务。我们的结论是,网络开发人员和公共部门机构仍然明显需要提高他们对现有隐私法规和他们的在线服务向第三方提供的个人信息的认识。在清晰透明地向用户传达与隐私相关的事项方面,还有很多工作要做。
{"title":"Assessing discrepancies between network traffic and privacy policies of public sector web services","authors":"Timi Heino, Robin Carlsson, Sampsa Rauti, V. Leppänen","doi":"10.1145/3538969.3539003","DOIUrl":"https://doi.org/10.1145/3538969.3539003","url":null,"abstract":"Online services are increasingly being used to complete everyday tasks, and ordinary users with very little technical knowledge have learned to use web services and applications. At the same time, many user applications are gradually moving from the traditional desktop environment to the web. Because of these developments, it is not surprising that user privacy has become a very important consideration when developing web services. In the current study, we assess the privacy of 34 web services provided and maintained by Finnish public sector bodies. We perform a network traffic analysis in order to find out what kind of personal data the studied services deliver to third party analytics services. We then take a look at the privacy policy documents of these web services and gauge their transparency and clarity by comparing their contents to the actual network data sent out by the web services. Our findings reveal numerous inconsistencies between what is said about handling personal data in the analyzed privacy policies and the actual traffic of the studied web services. Another prominent finding is the sheer amount of analytics services employed by the studied websites. We conclude that there is still an obvious need for web developers and public sector bodies to improve their awareness of existing privacy regulations and personal information their online services deliver to third parties. A lot of work also remains to be done in clearly and transparently communicating privacy-related matters to users.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124030531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Limitations of Web Cryptojacking Detection: A Practical Evaluation Web加密劫持检测的局限性:一个实用的评估
Paweł Rajba, W. Mazurczyk
Cryptojacking is one of the new threats that emerged several years ago with the growing popularity and increasing value of cryptocurrencies. In essence, it is a malicious technique where the attacker parasites on the victim’s resources like CPU time, memory, etc. to mine cryptocurrencies for his own benefit. Cryptojacking comes in two main flavors, i.e., as a malicious script embedded into the website or as a standalone malware residing on the compromised machine. As such threats are still widespread, in this paper, we perform a practical evaluation of the existing web browser blockers against real-world web-based cryptojacking solutions. The obtained experimental results reveal that in more than 60% of cases the tested defensive solutions fail in fighting this threat or can be easily fooled with a few simple modifications. This underlines the importance of further efforts toward developing effective countermeasures.
加密劫持是几年前随着加密货币的日益普及和价值的增加而出现的新威胁之一。从本质上讲,它是一种恶意技术,攻击者寄生在受害者的CPU时间、内存等资源上,为自己的利益挖掘加密货币。加密劫持有两种主要形式,即作为嵌入到网站中的恶意脚本或作为驻留在受感染机器上的独立恶意软件。由于此类威胁仍然普遍存在,在本文中,我们对现有的web浏览器拦截器针对现实世界中基于web的加密劫持解决方案进行了实际评估。实验结果表明,在超过60%的情况下,测试的防御解决方案无法对抗这种威胁,或者可以通过一些简单的修改很容易被愚弄。这强调了进一步努力制定有效对策的重要性。
{"title":"Limitations of Web Cryptojacking Detection: A Practical Evaluation","authors":"Paweł Rajba, W. Mazurczyk","doi":"10.1145/3538969.3544466","DOIUrl":"https://doi.org/10.1145/3538969.3544466","url":null,"abstract":"Cryptojacking is one of the new threats that emerged several years ago with the growing popularity and increasing value of cryptocurrencies. In essence, it is a malicious technique where the attacker parasites on the victim’s resources like CPU time, memory, etc. to mine cryptocurrencies for his own benefit. Cryptojacking comes in two main flavors, i.e., as a malicious script embedded into the website or as a standalone malware residing on the compromised machine. As such threats are still widespread, in this paper, we perform a practical evaluation of the existing web browser blockers against real-world web-based cryptojacking solutions. The obtained experimental results reveal that in more than 60% of cases the tested defensive solutions fail in fighting this threat or can be easily fooled with a few simple modifications. This underlines the importance of further efforts toward developing effective countermeasures.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130350515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
VMIFresh: Efficient and Fresh Caches for Virtual Machine Introspection VMIFresh:高效和新鲜的虚拟机自省缓存
Thomas Dangl, Stewart Sentanoe, Hans P. Reiser
Virtual machine introspection (VMI) is the process of extracting knowledge about the inner state of a virtual machine from the outside. Traditional passive introspection mechanisms have proved themselves ineffective in many application domains due to their low performance. As a remedy for this issue, caching at the level of the introspection application was introduced. However, this sacrificed the freshness of VMI and led to an inconsistent outside view. In this work, we propose a multi-purpose hybrid caching scheme with freshness and consistency guarantees that is interleaved with the guest’s MMU. This scheme can easily be integrated into existing applications and frameworks such as libvmi and Volatility 3. We demonstrate its feasibility by developing a prototype for such applications. Furthermore, the experimental evaluation of our approach suggests that it even significantly exceeds the performance of previous inconsistent caches.
虚拟机自省(VMI)是从外部提取有关虚拟机内部状态的知识的过程。传统的被动内省机制由于性能低下,在许多应用领域中已经被证明是无效的。为了解决这个问题,引入了内省应用程序级别的缓存。然而,这牺牲了VMI的新鲜度,并导致了不一致的外部观点。在这项工作中,我们提出了一种具有新鲜度和一致性保证的多用途混合缓存方案,该方案与客户的MMU交错。该方案可以很容易地集成到现有的应用程序和框架中,如libvmi和Volatility 3。我们通过开发此类应用的原型来证明其可行性。此外,我们的方法的实验评估表明,它甚至大大超过了以前的不一致缓存的性能。
{"title":"VMIFresh: Efficient and Fresh Caches for Virtual Machine Introspection","authors":"Thomas Dangl, Stewart Sentanoe, Hans P. Reiser","doi":"10.1145/3538969.3539002","DOIUrl":"https://doi.org/10.1145/3538969.3539002","url":null,"abstract":"Virtual machine introspection (VMI) is the process of extracting knowledge about the inner state of a virtual machine from the outside. Traditional passive introspection mechanisms have proved themselves ineffective in many application domains due to their low performance. As a remedy for this issue, caching at the level of the introspection application was introduced. However, this sacrificed the freshness of VMI and led to an inconsistent outside view. In this work, we propose a multi-purpose hybrid caching scheme with freshness and consistency guarantees that is interleaved with the guest’s MMU. This scheme can easily be integrated into existing applications and frameworks such as libvmi and Volatility 3. We demonstrate its feasibility by developing a prototype for such applications. Furthermore, the experimental evaluation of our approach suggests that it even significantly exceeds the performance of previous inconsistent caches.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122900813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 17th International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1