首页 > 最新文献

Proceedings of the 17th International Conference on Availability, Reliability and Security最新文献

英文 中文
Properties for Cybersecurity Awareness Posters’ Design and Quality Assessment 网络安全意识海报设计与质量评估的特点
Sunil Chaudhary, Marko Kompara, Sebastian Pape, V. Gkioulos
Posters are widely in practice to communicate cybersecurity awareness (CSA) messages. This popularity could be because it is one of the simplest mechanisms, and most people are accustomed to poster usage. Despite this, very little effort has been made to make the CSA poster design and assessment more systematic. Due to this, there exists a wide variation in CSA poster design. Alarmingly, many of them do not align with the needs and objectives of CSA. This study, therefore, intends to collect and analyze the properties that can guide the production of more uniform and effective posters for CSA purposes. At the same time, the study contributes to making the poster design and quality assessment approach more systematic. In order to do so, this study used a literature review for the elicitation of properties and an online assessment to analyze the relevancy of the elicited properties. As a final result, the study provides six main properties (i.e., topic, information quality, message framing, suggestions quality, content presentation, localization, and style and formatting) and their respective twenty-one sub-properties that can facilitate CSA poster design and its quality assessment.
海报在实践中广泛用于传播网络安全意识(CSA)信息。这种流行可能是因为它是最简单的机制之一,大多数人都习惯了海报的使用。尽管如此,在使CSA的海报设计和评估更加系统化方面所作的努力很少。因此,在CSA海报设计中存在着很大的差异。令人担忧的是,其中许多并不符合CSA的需求和目标。因此,本研究打算收集和分析可以指导为文化评价目的制作更统一和有效的海报的特性。同时,本研究有助于使招贴设计和质量评估方法更加系统化。为了做到这一点,本研究使用了文献综述的性质的启发和在线评估,以分析所引出的性质的相关性。最后,本研究提供了6个主要属性(即主题、信息质量、消息框架、建议质量、内容呈现、本地化、风格和格式)和它们各自的21个子属性,可以促进CSA海报设计及其质量评估。
{"title":"Properties for Cybersecurity Awareness Posters’ Design and Quality Assessment","authors":"Sunil Chaudhary, Marko Kompara, Sebastian Pape, V. Gkioulos","doi":"10.1145/3538969.3543794","DOIUrl":"https://doi.org/10.1145/3538969.3543794","url":null,"abstract":"Posters are widely in practice to communicate cybersecurity awareness (CSA) messages. This popularity could be because it is one of the simplest mechanisms, and most people are accustomed to poster usage. Despite this, very little effort has been made to make the CSA poster design and assessment more systematic. Due to this, there exists a wide variation in CSA poster design. Alarmingly, many of them do not align with the needs and objectives of CSA. This study, therefore, intends to collect and analyze the properties that can guide the production of more uniform and effective posters for CSA purposes. At the same time, the study contributes to making the poster design and quality assessment approach more systematic. In order to do so, this study used a literature review for the elicitation of properties and an online assessment to analyze the relevancy of the elicited properties. As a final result, the study provides six main properties (i.e., topic, information quality, message framing, suggestions quality, content presentation, localization, and style and formatting) and their respective twenty-one sub-properties that can facilitate CSA poster design and its quality assessment.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133986290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cookie Disclaimers: Impact of Design and Users’ Attitude Cookie免责声明:设计和用户态度的影响
B. Berens, H. Dietmann, Chiara Krisam, O. Kulyk, M. Volkamer
Dark patterns in cookie disclaimers are factors that are used to lead users to accept more cookies than needed and more than they are aware of. The contributions of this paper are (1) evaluating the efficacy of several of these factors while measuring actual behavior; (2) identifying users’ attitude towards cookie disclaimers including how they decide which cookies to accept or reject. We show that different visual representation of the reject/accept option have a significant impact on users’ decision. We also found that the labeling of the reject option has a significant impact. In addition, we confirm previous research regarding biasing text (which has no significant impact on users’ decision). Our results on users’ attitude towards cookie disclaimers indicate that for several user groups the design of the disclaimer only plays a secondary role when it comes to decision making. We provide recommendations on how to improve the situation for the different user groups.
cookie免责声明中的暗模式是用来引导用户接受比需要和他们意识到的更多的cookie的因素。本文的贡献在于:(1)在测量实际行为的同时评估这些因素的有效性;(2)识别用户对cookie免责声明的态度,包括他们如何决定接受或拒绝哪些cookie。我们表明,拒绝/接受选项的不同视觉表示对用户的决策有显著的影响。我们还发现,拒绝选项的标签有显著的影响。此外,我们确认了之前关于文本偏置的研究(这对用户的决策没有显著影响)。我们关于用户对cookie免责声明态度的研究结果表明,对于一些用户群体来说,免责声明的设计在决策时只起次要作用。我们就如何改善不同用户组的情况提供了建议。
{"title":"Cookie Disclaimers: Impact of Design and Users’ Attitude","authors":"B. Berens, H. Dietmann, Chiara Krisam, O. Kulyk, M. Volkamer","doi":"10.1145/3538969.3539008","DOIUrl":"https://doi.org/10.1145/3538969.3539008","url":null,"abstract":"Dark patterns in cookie disclaimers are factors that are used to lead users to accept more cookies than needed and more than they are aware of. The contributions of this paper are (1) evaluating the efficacy of several of these factors while measuring actual behavior; (2) identifying users’ attitude towards cookie disclaimers including how they decide which cookies to accept or reject. We show that different visual representation of the reject/accept option have a significant impact on users’ decision. We also found that the labeling of the reject option has a significant impact. In addition, we confirm previous research regarding biasing text (which has no significant impact on users’ decision). Our results on users’ attitude towards cookie disclaimers indicate that for several user groups the design of the disclaimer only plays a secondary role when it comes to decision making. We provide recommendations on how to improve the situation for the different user groups.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132826259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104 攻击电网变电站:攻击SCADA协议的实验演示
L. Erdődi, Pallavi Kaliyar, S. Houmb, Aida Akbarzadeh, A. Waltoft-Olsen
Smart grid brings various advantages such as increased automation in decision making, tighter coupling between production and consumption, and increased digitalization. Because of the many changes that the smart grid inflicts on the power grid as critical infrastructure, cyber security and robust resilience against cyberattacks are essential to handle. With an increased number of attack interfaces and more use of IP-enabled communication, digital stations or IEC 61850 substations need to operate according to a zero-trust security model. Cyber resilience needs to be an integrated part of the substation and its components. This paper presents an experiment utilizing a Hardware-In-the-Loop (HIL) Digital Station environment (enclave), where the focus is on attacking the SCADA protocol IEC 60870-5-104. We implemented 14 attacks, the attacks are described in detail, including the result of each attack action. Furthermore, the paper discusses the implications of the findings in the experiment and what power grid asset owners can do to protect their substations as part of their digitizing efforts.
智能电网带来了决策自动化程度提高、生产与消费耦合程度提高、数字化程度提高等诸多优势。由于智能电网作为关键基础设施给电网带来了许多变化,因此处理网络安全和抵御网络攻击的强大弹性至关重要。随着攻击接口数量的增加和ip通信的更多使用,数字站或IEC 61850变电站需要根据零信任安全模型运行。网络弹性需要成为变电站及其组件的一个组成部分。本文介绍了一个利用硬件在环(HIL)数字站环境(enclave)的实验,重点是攻击SCADA协议IEC 60870-5-104。我们实现了14次攻击,对攻击进行了详细的描述,包括每个攻击动作的结果。此外,本文还讨论了实验结果的含义,以及电网资产所有者可以做些什么来保护他们的变电站,作为他们数字化努力的一部分。
{"title":"Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104","authors":"L. Erdődi, Pallavi Kaliyar, S. Houmb, Aida Akbarzadeh, A. Waltoft-Olsen","doi":"10.1145/3538969.3544475","DOIUrl":"https://doi.org/10.1145/3538969.3544475","url":null,"abstract":"Smart grid brings various advantages such as increased automation in decision making, tighter coupling between production and consumption, and increased digitalization. Because of the many changes that the smart grid inflicts on the power grid as critical infrastructure, cyber security and robust resilience against cyberattacks are essential to handle. With an increased number of attack interfaces and more use of IP-enabled communication, digital stations or IEC 61850 substations need to operate according to a zero-trust security model. Cyber resilience needs to be an integrated part of the substation and its components. This paper presents an experiment utilizing a Hardware-In-the-Loop (HIL) Digital Station environment (enclave), where the focus is on attacking the SCADA protocol IEC 60870-5-104. We implemented 14 attacks, the attacks are described in detail, including the result of each attack action. Furthermore, the paper discusses the implications of the findings in the experiment and what power grid asset owners can do to protect their substations as part of their digitizing efforts.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116635602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Explainability-based Debugging of Machine Learning for Vulnerability Discovery 基于可解释性的机器学习漏洞发现调试
Angelo Sotgiu, Maura Pintor, B. Biggio
Machine learning has been successfully used for increasingly complex and critical tasks, achieving high performance and efficiency that would not be possible for human operators. Unfortunately, recent studies have shown that, despite its power, this technology tends to learn spurious correlations from data, making it weak and susceptible to manipulation. Explainability techniques are often used to identify the most relevant features contributing to the decision. However, this is often done by taking examples one by one and trying to show the problem locally. To mitigate this issue, we propose in this paper a systematic method to leverage explainability techniques and build on their results to highlight problems in the model design and training. With an empirical analysis on the Devign dataset, we validate the proposed methodology with a CodeBERT model trained for vulnerability discovery, showing that, despite its impressive performances, spurious correlations consistently steer its decision.
机器学习已经成功地用于越来越复杂和关键的任务,实现了人类操作员无法实现的高性能和高效率。不幸的是,最近的研究表明,尽管这种技术很强大,但它往往会从数据中学习到虚假的相关性,这使得它很弱,容易被操纵。可解释性技术通常用于识别对决策有贡献的最相关的特征。然而,这通常是通过一个接一个地举例子,并试图在局部展示问题来完成的。为了缓解这一问题,我们在本文中提出了一种系统的方法来利用可解释性技术,并以其结果为基础来突出模型设计和训练中的问题。通过对Devign数据集的实证分析,我们使用经过漏洞发现训练的CodeBERT模型验证了所提出的方法,结果表明,尽管其性能令人印象深刻,但虚假相关性始终引导其决策。
{"title":"Explainability-based Debugging of Machine Learning for Vulnerability Discovery","authors":"Angelo Sotgiu, Maura Pintor, B. Biggio","doi":"10.1145/3538969.3543809","DOIUrl":"https://doi.org/10.1145/3538969.3543809","url":null,"abstract":"Machine learning has been successfully used for increasingly complex and critical tasks, achieving high performance and efficiency that would not be possible for human operators. Unfortunately, recent studies have shown that, despite its power, this technology tends to learn spurious correlations from data, making it weak and susceptible to manipulation. Explainability techniques are often used to identify the most relevant features contributing to the decision. However, this is often done by taking examples one by one and trying to show the problem locally. To mitigate this issue, we propose in this paper a systematic method to leverage explainability techniques and build on their results to highlight problems in the model design and training. With an empirical analysis on the Devign dataset, we validate the proposed methodology with a CodeBERT model trained for vulnerability discovery, showing that, despite its impressive performances, spurious correlations consistently steer its decision.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124731653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Early Detection of Android Malware Using System Calls based Machine Learning Model 基于系统调用的机器学习模型早期检测Android恶意软件
Xinrun Zhang, A. Mathur, Lei Zhao, Safia Rahmat, Quamar Niyaz, A. Javaid, Xiaoli Yang
Several host intrusion detection systems (HIDSs) based on system call analysis have been proposed in the past to detect intrusions and malware using relevant datasets. Machine learning (ML) techniques have been applied on those datasets to improve the performances of HIDSs. However, the emphasis given on their real-world deployment is limited. To address this issue, we propose a framework for system call processing for benign and malware Android apps with an ability of early detection of malware. We extracted and analyzed system call traces for benign and malware apps, and processed their system call traces with N-gram and TF-IDF models. Six ML algorithms – Decision Trees, Random Forest, K-Nearest Neighbors, Naive Bayes, Support Vector Machines, and Multi-layer Perceptron – were trained for the malware detection system. The experimental results demonstrate that our Android malware detection system (AMDS), using traces of 3000 system calls, is capable of early detection with an average accuracy of 99.34%. We also implemented an Android app based on a client-server architecture for the proposed AMDS to demonstrate its deployment for malware detection in real-time.
过去已经提出了几种基于系统调用分析的主机入侵检测系统(hids),利用相关数据集检测入侵和恶意软件。机器学习(ML)技术已应用于这些数据集,以提高hids的性能。然而,对其实际部署的强调是有限的。为了解决这个问题,我们提出了一个系统调用处理框架,用于良性和恶意Android应用程序,具有早期检测恶意软件的能力。我们提取并分析了良性和恶意应用程序的系统调用痕迹,并使用N-gram和TF-IDF模型处理了它们的系统调用痕迹。六种机器学习算法——决策树、随机森林、k近邻、朴素贝叶斯、支持向量机和多层感知机——被训练用于恶意软件检测系统。实验结果表明,我们的Android恶意软件检测系统(AMDS)使用3000个系统调用的痕迹,能够以99.34%的平均准确率进行早期检测。我们还为提议的AMDS实现了一个基于客户端-服务器架构的Android应用程序,以演示其实时恶意软件检测的部署。
{"title":"An Early Detection of Android Malware Using System Calls based Machine Learning Model","authors":"Xinrun Zhang, A. Mathur, Lei Zhao, Safia Rahmat, Quamar Niyaz, A. Javaid, Xiaoli Yang","doi":"10.1145/3538969.3544413","DOIUrl":"https://doi.org/10.1145/3538969.3544413","url":null,"abstract":"Several host intrusion detection systems (HIDSs) based on system call analysis have been proposed in the past to detect intrusions and malware using relevant datasets. Machine learning (ML) techniques have been applied on those datasets to improve the performances of HIDSs. However, the emphasis given on their real-world deployment is limited. To address this issue, we propose a framework for system call processing for benign and malware Android apps with an ability of early detection of malware. We extracted and analyzed system call traces for benign and malware apps, and processed their system call traces with N-gram and TF-IDF models. Six ML algorithms – Decision Trees, Random Forest, K-Nearest Neighbors, Naive Bayes, Support Vector Machines, and Multi-layer Perceptron – were trained for the malware detection system. The experimental results demonstrate that our Android malware detection system (AMDS), using traces of 3000 system calls, is capable of early detection with an average accuracy of 99.34%. We also implemented an Android app based on a client-server architecture for the proposed AMDS to demonstrate its deployment for malware detection in real-time.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125930085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
UNCOVER: Development of an efficient steganalysis framework for uncovering hidden data in digital media 开发一种有效的隐写分析框架,用于发现数字媒体中隐藏的数据
V. Leask, R. Cogranne, D. Borghys, Helena Bruyninckx
This paper presents the general goals of Horizon 2020 project UNCOVER, whose overall purpose is to close the gap between academic work and operational needs in the fields of data-hiding. While digital data-hiding is a relatively new area of research, our motivation in this project has been rooted in the growing gap between the academic community and the operational needs of a ”real-life” scenario of object inspection in order to UNCOVER the presence of data secretly hidden. As well as an oversight into the structure of UNCOVER, our paper presents an empirical study on the impact of specifically training a detection method for a given data-hiding scheme, the so-called Stego-Source Mismatch, as an example of unexplored issues that raises important and mostly ignored consequences within the operational context the UNCOVER project targets.
本文介绍了地平线2020项目的总体目标,其总体目标是缩小数据隐藏领域的学术工作与操作需求之间的差距。虽然数字数据隐藏是一个相对较新的研究领域,但我们在这个项目中的动机源于学术界和“现实生活”场景的操作需求之间日益扩大的差距,即为了发现秘密隐藏的数据的存在而进行对象检查。除了对discover结构的监督外,我们的论文还提出了一项实证研究,研究了针对给定数据隐藏方案(所谓的Stego-Source Mismatch)专门训练检测方法的影响,作为未探索问题的一个例子,该问题在discover项目目标的操作上下文中提出了重要且大多被忽视的后果。
{"title":"UNCOVER: Development of an efficient steganalysis framework for uncovering hidden data in digital media","authors":"V. Leask, R. Cogranne, D. Borghys, Helena Bruyninckx","doi":"10.1145/3538969.3544468","DOIUrl":"https://doi.org/10.1145/3538969.3544468","url":null,"abstract":"This paper presents the general goals of Horizon 2020 project UNCOVER, whose overall purpose is to close the gap between academic work and operational needs in the fields of data-hiding. While digital data-hiding is a relatively new area of research, our motivation in this project has been rooted in the growing gap between the academic community and the operational needs of a ”real-life” scenario of object inspection in order to UNCOVER the presence of data secretly hidden. As well as an oversight into the structure of UNCOVER, our paper presents an empirical study on the impact of specifically training a detection method for a given data-hiding scheme, the so-called Stego-Source Mismatch, as an example of unexplored issues that raises important and mostly ignored consequences within the operational context the UNCOVER project targets.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129191934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Federated learning based IDS approach for the IoV 基于联邦学习的车联网IDS方法
A. Hbaieb, S. Ayed, L. Chaari
The Internet of Vehicles (IoV) is an Internet of Things (IoT) application that offers several utilities such as traffic analysis, safe driving, road optimization, and travel comfort. Software-Defined Networking (SDN) technology has been shown to provide various benefits to support the IoV. However, the construction of IoV makes it a complex system posing several challenges among which the important ones are security and privacy of data. Intrusion Detection Systems (IDSs) have been proposed in the IoV to identify cyber attacks and protect private data. Recently work has started to implement IDSs based on Federated learning as collaborative IDSs have proved effective security of IoV. In another hand, trust management has revolutionized the IoV filed, providing decision-making support to secure the network. Stating that an SDN-driven IoV architecture in which nodes trustworthiness gets assessed can provide a promising framework for IDS, we propose in this paper a Federated learning-based IDS for the IoV under the SDN structure. We integrate trust metrics to assist in securing the IoV network. Simulation experiments are conducted to validate the proposal.
车联网(IoV)是一种物联网(IoT)应用程序,提供多种实用程序,如交通分析、安全驾驶、道路优化和旅行舒适性。软件定义网络(SDN)技术已被证明可以为支持车联网提供各种好处。然而,车联网的建设使其成为一个复杂的系统,提出了许多挑战,其中重要的是数据的安全性和隐私性。在车联网中,入侵检测系统(ids)被用于识别网络攻击和保护私有数据。近年来,基于联邦学习的入侵防御系统的实施工作已经开始,因为协作入侵防御系统已经被证明是有效的车联网安全性。另一方面,信任管理彻底改变了车联网领域,为确保网络安全提供了决策支持。基于SDN驱动的车联网体系结构对节点可信度进行评估,为车联网IDS提供了一个有前景的框架,本文提出了SDN结构下基于联邦学习的车联网IDS。我们整合了信任指标,以帮助确保车联网的安全。仿真实验验证了该方案的有效性。
{"title":"Federated learning based IDS approach for the IoV","authors":"A. Hbaieb, S. Ayed, L. Chaari","doi":"10.1145/3538969.3544422","DOIUrl":"https://doi.org/10.1145/3538969.3544422","url":null,"abstract":"The Internet of Vehicles (IoV) is an Internet of Things (IoT) application that offers several utilities such as traffic analysis, safe driving, road optimization, and travel comfort. Software-Defined Networking (SDN) technology has been shown to provide various benefits to support the IoV. However, the construction of IoV makes it a complex system posing several challenges among which the important ones are security and privacy of data. Intrusion Detection Systems (IDSs) have been proposed in the IoV to identify cyber attacks and protect private data. Recently work has started to implement IDSs based on Federated learning as collaborative IDSs have proved effective security of IoV. In another hand, trust management has revolutionized the IoV filed, providing decision-making support to secure the network. Stating that an SDN-driven IoV architecture in which nodes trustworthiness gets assessed can provide a promising framework for IDS, we propose in this paper a Federated learning-based IDS for the IoV under the SDN structure. We integrate trust metrics to assist in securing the IoV network. Simulation experiments are conducted to validate the proposal.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122949404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks 规避基于深度强化学习的网络入侵检测与对抗性攻击
Mohamed Amine Merzouk, Joséphine Delas, Christopher Neal, F. Cuppens, N. Cuppens-Boulahia, Reda Yaich
An Intrusion Detection System (IDS) aims to detect attacks conducted over computer networks by analyzing traffic data. Deep Reinforcement Learning (Deep-RL) is a promising lead in IDS research, due to its lightness and adaptability. However, the neural networks on which Deep-RL is based can be vulnerable to adversarial attacks. By applying a well-computed modification to malicious traffic, adversarial examples can evade detection. In this paper, we test the performance of a state-of-the-art Deep-RL IDS agent against the Fast Gradient Sign Method (FGSM) and Basic Iterative Method (BIM) adversarial attacks. We demonstrate that the performance of the Deep-RL detection agent is compromised in the face of adversarial examples and highlight the need for future Deep-RL IDS work to consider mechanisms for coping with adversarial examples.
入侵检测系统(IDS)的目的是通过分析流量数据来检测通过计算机网络进行的攻击。深度强化学习(Deep- Reinforcement Learning, Deep- rl)因其轻巧和适应性而成为IDS研究的一个很有前途的方向。然而,Deep-RL所基于的神经网络可能容易受到对抗性攻击。通过对恶意流量进行精心计算的修改,对抗性示例可以逃避检测。在本文中,我们测试了最先进的Deep-RL IDS代理对快速梯度符号方法(FGSM)和基本迭代方法(BIM)对抗性攻击的性能。我们证明了Deep-RL检测代理的性能在面对对抗性示例时会受到损害,并强调了未来Deep-RL IDS工作需要考虑应对对抗性示例的机制。
{"title":"Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks","authors":"Mohamed Amine Merzouk, Joséphine Delas, Christopher Neal, F. Cuppens, N. Cuppens-Boulahia, Reda Yaich","doi":"10.1145/3538969.3539006","DOIUrl":"https://doi.org/10.1145/3538969.3539006","url":null,"abstract":"An Intrusion Detection System (IDS) aims to detect attacks conducted over computer networks by analyzing traffic data. Deep Reinforcement Learning (Deep-RL) is a promising lead in IDS research, due to its lightness and adaptability. However, the neural networks on which Deep-RL is based can be vulnerable to adversarial attacks. By applying a well-computed modification to malicious traffic, adversarial examples can evade detection. In this paper, we test the performance of a state-of-the-art Deep-RL IDS agent against the Fast Gradient Sign Method (FGSM) and Basic Iterative Method (BIM) adversarial attacks. We demonstrate that the performance of the Deep-RL detection agent is compromised in the face of adversarial examples and highlight the need for future Deep-RL IDS work to consider mechanisms for coping with adversarial examples.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121670617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trusted and Secure Self-Sovereign Identity framework 可信和安全的自我主权身份框架
Vaios Bolgouras, Anna Angelogianni, Ilias Politis, C. Xenakis
Digitization, in terms of online services, work environment and other day-to-day procedures, has lead to the wide adoption and use of the respective digital identities. Users utilize their digital personas and their corresponding attributes on a daily basis, in order to gain access to resources and services. This is achieved through the use of numerous identity management schemes, which often suffer from multiple vulnerabilities and are susceptible to threats. This results in the compromise of user privacy and data security. In the recent years, new technologies related to identity management, like the Self-Sovereign Identity (SSI) and eIDAS concepts, are employed to mitigate these issues. This paper presents an architecture that combines state-of-the-art technologies regarding identity management, authentication and secure storage. More specifically, the proposed framework utilizes IOTA-based SSI, the eIDAS framework, FIDO protocol and Trusted Execution Environment (TEE), resulting in a trusted and secure identity management framework. Our solution is thoroughly presented via scenarios, showcasing its robustness and how well it copes in relation to our threat model.
在网上服务、工作环境和其他日常程序方面的数码化,已导致广泛采用和使用各自的数码身份。用户每天使用他们的数字角色和相应的属性,以便访问资源和服务。这是通过使用许多身份管理方案来实现的,这些方案通常存在多个漏洞,容易受到威胁。这将导致用户隐私和数据安全的妥协。近年来,与身份管理相关的新技术,如自我主权身份(SSI)和eIDAS概念,被用来缓解这些问题。本文提出了一种结合了有关身份管理、身份验证和安全存储的最新技术的体系结构。更具体地说,提议的框架利用基于iota的SSI、eIDAS框架、FIDO协议和可信执行环境(TEE),形成一个可信和安全的身份管理框架。我们的解决方案通过场景彻底呈现,展示了它的健壮性以及它如何处理与我们的威胁模型相关的问题。
{"title":"Trusted and Secure Self-Sovereign Identity framework","authors":"Vaios Bolgouras, Anna Angelogianni, Ilias Politis, C. Xenakis","doi":"10.1145/3538969.3544436","DOIUrl":"https://doi.org/10.1145/3538969.3544436","url":null,"abstract":"Digitization, in terms of online services, work environment and other day-to-day procedures, has lead to the wide adoption and use of the respective digital identities. Users utilize their digital personas and their corresponding attributes on a daily basis, in order to gain access to resources and services. This is achieved through the use of numerous identity management schemes, which often suffer from multiple vulnerabilities and are susceptible to threats. This results in the compromise of user privacy and data security. In the recent years, new technologies related to identity management, like the Self-Sovereign Identity (SSI) and eIDAS concepts, are employed to mitigate these issues. This paper presents an architecture that combines state-of-the-art technologies regarding identity management, authentication and secure storage. More specifically, the proposed framework utilizes IOTA-based SSI, the eIDAS framework, FIDO protocol and Trusted Execution Environment (TEE), resulting in a trusted and secure identity management framework. Our solution is thoroughly presented via scenarios, showcasing its robustness and how well it copes in relation to our threat model.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131471405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security Risk Management in Shared Mobility Integration 共享移动集成中的安全风险管理
A. O. Affia, Raimundas Matulevičius
Urbanization pushes toward the need for integrated shared mobility solutions such as bike-sharing, car-sharing, and other public transport schemes to provide seamless inter-modal journeys to users. Achieving shared mobility integration can be done by tickets and payments, leveraging access to user data and payment information across mobility systems to allow access to and payment for transport services, and making multi-modal transport more accessible. Providing such mobility services requires access to and use of sensitive user data and sensitive safety-related functions vulnerable to cyberattacks. However, research examining the security and privacy concerns in shared mobility integration is limited. Thus, we evaluate shared mobility integration components, stakeholders, and processes based on literature, to provide an abstract integration model when integrating shared mobility schemes. We also highlight mentions of security related issues and the potential security risks as a result of implementing shared mobility integration. We then applied lessons from our analysis to a real-world bike-sharing integration case study, analyzing potential security risks, proposing appropriate suggestions to manage discovered security risks. Our findings and discussions benefit transport operators, authorities, and mobility stakeholders by encouraging security-by-design and security risk management practices when implementing shared mobility integration schemes.
城市化推动了对综合共享出行解决方案的需求,如自行车共享、汽车共享和其他公共交通方案,为用户提供无缝的多式联运旅程。通过购票和支付,利用跨移动系统的用户数据和支付信息,实现交通服务的获取和支付,并使多式联运更容易实现,从而实现共享交通一体化。提供此类移动服务需要访问和使用易受网络攻击的敏感用户数据和敏感的安全相关功能。然而,关于共享移动集成中的安全和隐私问题的研究是有限的。因此,我们基于文献对共享移动出行集成组件、利益相关者和流程进行评估,以提供集成共享移动出行方案时的抽象集成模型。我们还强调了与安全相关的问题以及实现共享移动集成所带来的潜在安全风险。然后,我们将分析的经验教训应用到现实世界的共享单车整合案例研究中,分析潜在的安全风险,提出适当的建议来管理发现的安全风险。我们的研究结果和讨论通过鼓励在实施共享交通一体化方案时采用安全设计和安全风险管理实践,使交通运营商、当局和交通利益相关者受益。
{"title":"Security Risk Management in Shared Mobility Integration","authors":"A. O. Affia, Raimundas Matulevičius","doi":"10.1145/3538969.3543797","DOIUrl":"https://doi.org/10.1145/3538969.3543797","url":null,"abstract":"Urbanization pushes toward the need for integrated shared mobility solutions such as bike-sharing, car-sharing, and other public transport schemes to provide seamless inter-modal journeys to users. Achieving shared mobility integration can be done by tickets and payments, leveraging access to user data and payment information across mobility systems to allow access to and payment for transport services, and making multi-modal transport more accessible. Providing such mobility services requires access to and use of sensitive user data and sensitive safety-related functions vulnerable to cyberattacks. However, research examining the security and privacy concerns in shared mobility integration is limited. Thus, we evaluate shared mobility integration components, stakeholders, and processes based on literature, to provide an abstract integration model when integrating shared mobility schemes. We also highlight mentions of security related issues and the potential security risks as a result of implementing shared mobility integration. We then applied lessons from our analysis to a real-world bike-sharing integration case study, analyzing potential security risks, proposing appropriate suggestions to manage discovered security risks. Our findings and discussions benefit transport operators, authorities, and mobility stakeholders by encouraging security-by-design and security risk management practices when implementing shared mobility integration schemes.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125331593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the 17th International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1