首页 > 最新文献

Proceedings of the 2021 New Security Paradigms Workshop最新文献

英文 中文
COLBAC: Shifting Cybersecurity from Hierarchical to Horizontal Designs COLBAC:将网络安全从层次设计转变为水平设计
Pub Date : 2021-10-25 DOI: 10.1145/3498891.3498903
Kevin Gallagher, Santiago Torres-Arias, N. Memon, J. Feldman
Cybersecurity suffers from an oversaturation of centralized, hierarchical systems and a lack of exploration in the area of horizontal security, or security techniques and technologies which utilize democratic participation for security decision-making. Because of this, many horizontally governed organizations such as activist groups, worker cooperatives, trade unions, not-for-profit associations, and others are not represented in current cybersecurity solutions, and are forced to adopt hierarchical solutions to cybersecurity problems. This causes power dynamic mismatches that lead to cybersecurity and organizational operations failures. In this work we introduce COLBAC, a collective based access control system aimed at addressing this lack. COLBAC uses democratically authorized capability tokens to express access control policies. It allows for a flexible and dynamic degree of horizontality to meet the needs of different horizontally governed organizations. After introducing COLBAC, we finish with a discussion on future work needed to realize more horizontal security techniques, tools, and technologies.
网络安全遭受集中式,分层系统的过度饱和以及在水平安全领域缺乏探索,或者利用民主参与安全决策的安全技术和技术。正因为如此,许多横向管理的组织,如激进组织、工人合作社、工会、非营利协会等,在当前的网络安全解决方案中没有代表,并被迫采用分层解决网络安全问题的解决方案。这会导致权力动态不匹配,从而导致网络安全和组织运营失败。在这项工作中,我们介绍了COLBAC,一个基于集体的访问控制系统,旨在解决这一不足。COLBAC使用民主授权的功能令牌来表示访问控制策略。它允许灵活和动态的水平程度,以满足不同水平治理组织的需求。在介绍COLBAC之后,我们将讨论实现更多水平安全技术、工具和技术所需的未来工作。
{"title":"COLBAC: Shifting Cybersecurity from Hierarchical to Horizontal Designs","authors":"Kevin Gallagher, Santiago Torres-Arias, N. Memon, J. Feldman","doi":"10.1145/3498891.3498903","DOIUrl":"https://doi.org/10.1145/3498891.3498903","url":null,"abstract":"Cybersecurity suffers from an oversaturation of centralized, hierarchical systems and a lack of exploration in the area of horizontal security, or security techniques and technologies which utilize democratic participation for security decision-making. Because of this, many horizontally governed organizations such as activist groups, worker cooperatives, trade unions, not-for-profit associations, and others are not represented in current cybersecurity solutions, and are forced to adopt hierarchical solutions to cybersecurity problems. This causes power dynamic mismatches that lead to cybersecurity and organizational operations failures. In this work we introduce COLBAC, a collective based access control system aimed at addressing this lack. COLBAC uses democratically authorized capability tokens to express access control policies. It allows for a flexible and dynamic degree of horizontality to meet the needs of different horizontally governed organizations. After introducing COLBAC, we finish with a discussion on future work needed to realize more horizontal security techniques, tools, and technologies.","PeriodicalId":320273,"journal":{"name":"Proceedings of the 2021 New Security Paradigms Workshop","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123344344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The tragedy of common bandwidth: rDDoS 公共带宽的悲剧:rDDoS
Pub Date : 2021-10-25 DOI: 10.1145/3498891.3500928
Arturs Lavrenovs, É. Leverett, Aaron L. Kaplan
Reflected distributed denial of service (rDDoS) policy interventions often focus on reflector count reductions. Current rDDoS metrics (max DDoS witnessed) favour commercial responses, but don’t frame this as a problem of the commons. This results in non-objective, and non-independent discussion of policy interventions, and holds back discussion of any public health style interventions that aren’t commercially motivated. In this paper, we explore multiple questions when it comes to measuring the potential for rDDoS attacks (i.e. how large could a rDDoS attack become?). We also raise some new questions. The paper builds on top of our previous research [6]. Whereas [7] was motivated by understanding properties of the individual rDDoS reflectors, in the current paper we present evidence that chasing high bandwidth reflectors is far more impact-ful in rDDoS harm reduction. If the internet is a commons, then high bandwidth reflectors contribute the most to a tragedy of the commons (see Figure 1). We examine and compare reflector counts, contribution estimation, and empirical contribution verification as methodologies. We also extend previous works on the topic to provide ASN level metrics, and show that the top 5 ASNs contribute between 30-70 percent of the problem depending on the protocol examined. This finding alone, motivates much easier and cheaper layered policy interventions which we discuss within the paper. The motivation of our research is also given by the surprisingly strong increase of actual (r)DDoS attacks as shown by [30]. Given this increase, our aim is to trigger policy change1 when it comes to cleaning up reflectors. Our main contribution in this paper is to show that policy should focus on the high bandwidth reflectors and some top ASNs reduce rDDoS’s potential.
反射式分布式拒绝服务(rDDoS)策略干预通常侧重于减少反射器计数。当前的rDDoS指标(最大DDoS目击值)倾向于商业响应,但不认为这是一个公共问题。这导致了对政策干预措施的非客观、非独立的讨论,并阻碍了对任何非商业动机的公共卫生干预措施的讨论。在本文中,我们探讨了衡量rDDoS攻击潜力的多个问题(即rDDoS攻击可能会有多大?)。我们也提出了一些新的问题。本文建立在我们之前的研究[6]的基础上。鉴于[7]的动机是了解单个rDDoS反射器的特性,在当前的论文中,我们提供了证据,证明追逐高带宽反射器在减少rDDoS危害方面的影响要大得多。如果互联网是公共资源,那么高带宽反射器对公共资源悲剧的贡献最大(见图1)。我们将反射器数量、贡献估计和经验贡献验证作为方法进行检查和比较。我们还扩展了先前关于该主题的工作,以提供ASN级别度量,并显示根据所检查的协议,前5个ASN贡献了30- 70%的问题。这一发现本身就激励了我们在论文中讨论的更容易和更便宜的分层政策干预。我们研究的动机还来自于实际(r)DDoS攻击惊人的强劲增长,如[30]所示。鉴于这一增长,我们的目标是在清理反射器方面引发政策变化。我们在本文中的主要贡献是表明策略应该关注高带宽反射器和一些顶级asn减少rDDoS的潜力。
{"title":"The tragedy of common bandwidth: rDDoS","authors":"Arturs Lavrenovs, É. Leverett, Aaron L. Kaplan","doi":"10.1145/3498891.3500928","DOIUrl":"https://doi.org/10.1145/3498891.3500928","url":null,"abstract":"Reflected distributed denial of service (rDDoS) policy interventions often focus on reflector count reductions. Current rDDoS metrics (max DDoS witnessed) favour commercial responses, but don’t frame this as a problem of the commons. This results in non-objective, and non-independent discussion of policy interventions, and holds back discussion of any public health style interventions that aren’t commercially motivated. In this paper, we explore multiple questions when it comes to measuring the potential for rDDoS attacks (i.e. how large could a rDDoS attack become?). We also raise some new questions. The paper builds on top of our previous research [6]. Whereas [7] was motivated by understanding properties of the individual rDDoS reflectors, in the current paper we present evidence that chasing high bandwidth reflectors is far more impact-ful in rDDoS harm reduction. If the internet is a commons, then high bandwidth reflectors contribute the most to a tragedy of the commons (see Figure 1). We examine and compare reflector counts, contribution estimation, and empirical contribution verification as methodologies. We also extend previous works on the topic to provide ASN level metrics, and show that the top 5 ASNs contribute between 30-70 percent of the problem depending on the protocol examined. This finding alone, motivates much easier and cheaper layered policy interventions which we discuss within the paper. The motivation of our research is also given by the surprisingly strong increase of actual (r)DDoS attacks as shown by [30]. Given this increase, our aim is to trigger policy change1 when it comes to cleaning up reflectors. Our main contribution in this paper is to show that policy should focus on the high bandwidth reflectors and some top ASNs reduce rDDoS’s potential.","PeriodicalId":320273,"journal":{"name":"Proceedings of the 2021 New Security Paradigms Workshop","volume":"104 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126128331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Change that Respects Business Expertise: Stories as Prompts for a Conversation about Organisation Security 尊重业务专长的变革:组织安全对话的故事提示
Pub Date : 2021-10-25 DOI: 10.1145/3498891.3498895
S. Parkin, Simon Arnell, Jeremy Ward
Leaders of organisations must make investment decisions relating to the security of their organisation. This often happens through consultation with a security specialist. Consultations may be regarded as conversations taking place in a trading zone between the two domains. We propose that supporting the trading zone is a route to sustainable, workable security change improvements. Prompts for such improvements are already in place, in the security stories that reach business leaders through news media, or anecdotes from trusted peers. However, a shift in perspective is needed to view these stories and anecdotes as prompts for individual decision makers to enter into the trading zone with security specialists. We illustrate how to facilitate this shift by recasting security ontology tools, previously centred around security-specific expertise, as a support device to enrich conversations between business expertise and security advice toward finding workable security choices. We frame our proposal within a broader view of community transformation, exploring the important principle of identifying practical opportunities to inform discussions about security solutions that are appropriate in the business context. Community-level discussions have potential to lead to more lasting, effective improvements than those instigated by one-way interventions from security specialists. We extend the view, applying the paradigm to articulate the importance of two-way conversations between business peers and security specialists.
组织的领导者必须做出与组织安全相关的投资决策。这通常是通过咨询安全专家来实现的。磋商可被视为在两个领域之间的贸易区内进行的对话。我们建议,支持自贸区是一条可持续、可行的安全变革改进之路。企业领导人通过新闻媒体了解到的安全故事,或者来自值得信赖的同行的轶事,都已经有了这种改进的提示。然而,需要转变观点,将这些故事和轶事视为促使个别决策者与安全专家进入交易区的提示。我们将通过重新定义安全本体工具(以前以特定于安全的专业知识为中心)来说明如何促进这种转变,将其作为一种支持设备,以丰富业务专业知识和安全建议之间的对话,从而找到可行的安全选择。我们在更广阔的社区转型视野中构建了我们的建议,探索了确定实际机会的重要原则,以便为有关适合业务环境的安全解决方案的讨论提供信息。社区层面的讨论比安全专家的单向干预有可能带来更持久、更有效的改进。我们扩展了这个观点,应用这个范例来阐明业务同行和安全专家之间双向对话的重要性。
{"title":"Change that Respects Business Expertise: Stories as Prompts for a Conversation about Organisation Security","authors":"S. Parkin, Simon Arnell, Jeremy Ward","doi":"10.1145/3498891.3498895","DOIUrl":"https://doi.org/10.1145/3498891.3498895","url":null,"abstract":"Leaders of organisations must make investment decisions relating to the security of their organisation. This often happens through consultation with a security specialist. Consultations may be regarded as conversations taking place in a trading zone between the two domains. We propose that supporting the trading zone is a route to sustainable, workable security change improvements. Prompts for such improvements are already in place, in the security stories that reach business leaders through news media, or anecdotes from trusted peers. However, a shift in perspective is needed to view these stories and anecdotes as prompts for individual decision makers to enter into the trading zone with security specialists. We illustrate how to facilitate this shift by recasting security ontology tools, previously centred around security-specific expertise, as a support device to enrich conversations between business expertise and security advice toward finding workable security choices. We frame our proposal within a broader view of community transformation, exploring the important principle of identifying practical opportunities to inform discussions about security solutions that are appropriate in the business context. Community-level discussions have potential to lead to more lasting, effective improvements than those instigated by one-way interventions from security specialists. We extend the view, applying the paradigm to articulate the importance of two-way conversations between business peers and security specialists.","PeriodicalId":320273,"journal":{"name":"Proceedings of the 2021 New Security Paradigms Workshop","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124477332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Shame in Cyber Security: Effective Behavior Modification Tool or Counterproductive Foil? 网络安全中的羞耻感:有效的行为矫正工具还是适得其反的陪衬?
Pub Date : 2021-10-25 DOI: 10.1145/3498891.3498896
K. Renaud, R. Searle, M. Dupuis
Organizations often respond to cyber security breaches by blaming and shaming the employees who were involved. There is an intuitive natural justice to using such strategies in the belief that the need to avoid repeated shaming occurrences will encourage them to exercise more care. However, psychology highlights significant short- and long-term impacts and harmful consequences of felt shame. To explore and investigate this in the cyber domain, we asked those who had inadvertently triggered an adverse cyber security incident to tell us about their responses and to recount the emotions they experienced when this occurred. We also examined the impact of the organization’s management of the incident on the “culprit’s” future behaviors and attitudes. We discovered that those who had caused a cyber security incident often felt guilt and shame, and their employers’ responses either exacerbated or ameliorated these negative emotions. In the case of the former, there were enduring unfavorable consequences, both in terms of employee well-being and damaged relationships. We conclude with a set of recommendations for employers, in terms of responding to adverse cyber security incidents. The aim is to ensure that negative emotions, such as shame, do not make the incident much more damaging than it needs to be.
组织对网络安全漏洞的反应通常是指责和羞辱参与其中的员工。使用这种策略有一种直觉上的自然正义,因为他们相信,避免重复羞辱的需要将鼓励他们更加小心。然而,心理学强调了羞耻的短期和长期影响以及有害后果。为了在网络领域探索和调查这一点,我们询问了那些无意中引发不利网络安全事件的人,请他们告诉我们他们的反应,并讲述他们在这种情况发生时的情绪。我们还研究了组织对事件的管理对“罪魁祸首”未来行为和态度的影响。我们发现,那些造成网络安全事件的人经常感到内疚和羞耻,而雇主的反应要么加剧了这些负面情绪,要么减轻了这些情绪。在前一种情况下,无论是在员工福利方面还是在关系受损方面,都会产生持久的不利后果。最后,我们就应对不利的网络安全事件向雇主提出了一系列建议。这样做的目的是确保诸如羞耻之类的负面情绪不会使事件造成不必要的破坏。
{"title":"Shame in Cyber Security: Effective Behavior Modification Tool or Counterproductive Foil?","authors":"K. Renaud, R. Searle, M. Dupuis","doi":"10.1145/3498891.3498896","DOIUrl":"https://doi.org/10.1145/3498891.3498896","url":null,"abstract":"Organizations often respond to cyber security breaches by blaming and shaming the employees who were involved. There is an intuitive natural justice to using such strategies in the belief that the need to avoid repeated shaming occurrences will encourage them to exercise more care. However, psychology highlights significant short- and long-term impacts and harmful consequences of felt shame. To explore and investigate this in the cyber domain, we asked those who had inadvertently triggered an adverse cyber security incident to tell us about their responses and to recount the emotions they experienced when this occurred. We also examined the impact of the organization’s management of the incident on the “culprit’s” future behaviors and attitudes. We discovered that those who had caused a cyber security incident often felt guilt and shame, and their employers’ responses either exacerbated or ameliorated these negative emotions. In the case of the former, there were enduring unfavorable consequences, both in terms of employee well-being and damaged relationships. We conclude with a set of recommendations for employers, in terms of responding to adverse cyber security incidents. The aim is to ensure that negative emotions, such as shame, do not make the incident much more damaging than it needs to be.","PeriodicalId":320273,"journal":{"name":"Proceedings of the 2021 New Security Paradigms Workshop","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130851157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
VoxPop: An Experimental Social Media Platform for Calibrated (Mis)information Discourse VoxPop:一个校准(Mis)信息话语的实验性社交媒体平台
Pub Date : 2021-10-25 DOI: 10.1145/3498891.3498893
Filipo Sharevski, Peter Jachim, Emma Pieroni, Nathaniel Jachim
VoxPop, shortened for Vox Populi, is an experimental social media platform that neither has an absolute “truth-keeping” mission nor an uncontrolled “free-speaking” vision. Instead, it allows discourses that naturally include (mis)information to contextualize among users with the aid of UX design and data science affordances and frictions. VoxPop introduces calibration metrics, namely a Faithfulness-To-Known-Facts (FTKF) score associated with each post and a Cumulative FTKF (C-FTKF) score associated with each user, appealing to the self-regulated participation using sociocognitive signals. The goal of VoxPop is not to become an ideal platform—that is impossible; rather, to bring to attention an adaptive approach in dealing with (mis)information rooted in social calibration instead of imposing or avoiding altogether punitive moderation.
VoxPop是Vox Populi的缩写,是一个实验性的社交媒体平台,既没有绝对的“保持真相”使命,也没有不受控制的“自由言论”愿景。相反,它允许自然包含(错误)信息的话语在用户体验设计和数据科学的支持和摩擦的帮助下在用户之间进行上下文化。VoxPop引入了校准指标,即与每个帖子相关的忠实于已知事实(FTKF)分数和与每个用户相关的累积FTKF (C-FTKF)分数,利用社会认知信号吸引自我调节的参与。VoxPop的目标不是成为一个理想的平台——那是不可能的;更确切地说,是让人们注意到一种处理根植于社会校准的(错误)信息的适应性方法,而不是强加或避免完全惩罚性的节制。
{"title":"VoxPop: An Experimental Social Media Platform for Calibrated (Mis)information Discourse","authors":"Filipo Sharevski, Peter Jachim, Emma Pieroni, Nathaniel Jachim","doi":"10.1145/3498891.3498893","DOIUrl":"https://doi.org/10.1145/3498891.3498893","url":null,"abstract":"VoxPop, shortened for Vox Populi, is an experimental social media platform that neither has an absolute “truth-keeping” mission nor an uncontrolled “free-speaking” vision. Instead, it allows discourses that naturally include (mis)information to contextualize among users with the aid of UX design and data science affordances and frictions. VoxPop introduces calibration metrics, namely a Faithfulness-To-Known-Facts (FTKF) score associated with each post and a Cumulative FTKF (C-FTKF) score associated with each user, appealing to the self-regulated participation using sociocognitive signals. The goal of VoxPop is not to become an ideal platform—that is impossible; rather, to bring to attention an adaptive approach in dealing with (mis)information rooted in social calibration instead of imposing or avoiding altogether punitive moderation.","PeriodicalId":320273,"journal":{"name":"Proceedings of the 2021 New Security Paradigms Workshop","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134379432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
“Taking out the Trash”: Why Security Behavior Change requires Intentional Forgetting “倒垃圾”:为什么安全行为的改变需要有意识的遗忘
Pub Date : 2021-10-25 DOI: 10.1145/3498891.3498902
Jonas Hielscher, A. Kluge, Uta Menges, M. Sasse
Security awareness is big business – virtually every organization in the Western world provides some form of awareness or training, mostly bought from external vendors. However, studies and industry reports show that these programs have little to no effect in terms of changing the security behavior of employees. We explain the conditions that enable behavior change, and identify one significant blocker in the implementation phase: not disabling existing (insecure) routines – failure to take out the trash – prevents embedding of new (secure) routines. Organizational Psychology offers the paradigm Intentional Forgetting (IF) and associated tools for replacing old (insecure) behaviors with new (secure) ones by identifying and eliminating different cues (sensoric, routine-based, time and space based as well as situational strength cues) that trigger old behavior. We introduce the underlying theory, examples of successful application in safety contexts, and show how its application leads to effective behavior change by reducing the information that needs to be transmitted to employees, and suppressing obsolete routines.
安全意识是一项大业务——实际上,西方世界的每个组织都提供某种形式的安全意识或培训,大部分是从外部供应商那里购买的。然而,研究和行业报告表明,这些计划在改变员工的安全行为方面几乎没有效果。我们解释了导致行为改变的条件,并确定了实现阶段的一个重要障碍:不禁用现有的(不安全的)例程——无法取出垃圾——会阻止嵌入新的(安全的)例程。组织心理学提供了故意遗忘(IF)范式和相关工具,通过识别和消除触发旧行为的不同线索(感官、常规、时间和空间以及情境力量线索),用新的(安全的)行为取代旧的(不安全的)行为。我们介绍了基本理论,在安全环境中成功应用的例子,并展示了它的应用如何通过减少需要传递给员工的信息和抑制过时的惯例来导致有效的行为改变。
{"title":"“Taking out the Trash”: Why Security Behavior Change requires Intentional Forgetting","authors":"Jonas Hielscher, A. Kluge, Uta Menges, M. Sasse","doi":"10.1145/3498891.3498902","DOIUrl":"https://doi.org/10.1145/3498891.3498902","url":null,"abstract":"Security awareness is big business – virtually every organization in the Western world provides some form of awareness or training, mostly bought from external vendors. However, studies and industry reports show that these programs have little to no effect in terms of changing the security behavior of employees. We explain the conditions that enable behavior change, and identify one significant blocker in the implementation phase: not disabling existing (insecure) routines – failure to take out the trash – prevents embedding of new (secure) routines. Organizational Psychology offers the paradigm Intentional Forgetting (IF) and associated tools for replacing old (insecure) behaviors with new (secure) ones by identifying and eliminating different cues (sensoric, routine-based, time and space based as well as situational strength cues) that trigger old behavior. We introduce the underlying theory, examples of successful application in safety contexts, and show how its application leads to effective behavior change by reducing the information that needs to be transmitted to employees, and suppressing obsolete routines.","PeriodicalId":320273,"journal":{"name":"Proceedings of the 2021 New Security Paradigms Workshop","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129221719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Beyond NVD: Cybersecurity meets the Semantic Web. 超越NVD:网络安全遇上语义网。
Pub Date : 2021-10-25 DOI: 10.1145/3498891.3501259
Raúl Aranovich, Katya Katsy, Benyamin Ahmadnia, V. Filkov, K. Sagae
Cybersecurity experts rely on the knowledge stored in databases like the NVD to do their work, but these are not the only sources of information about threats and vulnerabilities. Much of that information flows through social media channels. In this paper we argue that security experts and general users alike can benefit from the technologies of the Semantic Web, merging heterogeneous sources of knowledge in an ontological representation. We present a system that has an ontology of vulnerabilities at its core, but that is enhanced with NLP tools to identify cybersecurity-related information in social media and to launch queries over heterogeneous data sources. The transformative power of Semantic Web technologies for cybersecurity, which has been proven in the biomedical field, is evaluated and discussed.
网络安全专家依靠存储在NVD等数据库中的知识来完成他们的工作,但这些并不是有关威胁和漏洞的唯一信息来源。其中大部分信息通过社交媒体渠道流动。在本文中,我们认为安全专家和普通用户都可以从语义网技术中受益,它将异构的知识来源合并到一个本体表示中。我们提出了一个以漏洞本体为核心的系统,但它通过NLP工具得到增强,以识别社交媒体中的网络安全相关信息,并对异构数据源发起查询。语义网技术在网络安全方面的变革力量在生物医学领域得到了验证,本文对其进行了评估和讨论。
{"title":"Beyond NVD: Cybersecurity meets the Semantic Web.","authors":"Raúl Aranovich, Katya Katsy, Benyamin Ahmadnia, V. Filkov, K. Sagae","doi":"10.1145/3498891.3501259","DOIUrl":"https://doi.org/10.1145/3498891.3501259","url":null,"abstract":"Cybersecurity experts rely on the knowledge stored in databases like the NVD to do their work, but these are not the only sources of information about threats and vulnerabilities. Much of that information flows through social media channels. In this paper we argue that security experts and general users alike can benefit from the technologies of the Semantic Web, merging heterogeneous sources of knowledge in an ontological representation. We present a system that has an ontology of vulnerabilities at its core, but that is enhanced with NLP tools to identify cybersecurity-related information in social media and to launch queries over heterogeneous data sources. The transformative power of Semantic Web technologies for cybersecurity, which has been proven in the biomedical field, is evaluated and discussed.","PeriodicalId":320273,"journal":{"name":"Proceedings of the 2021 New Security Paradigms Workshop","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133976731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Blessed Are The Lawyers, For They Shall Inherit Cybersecurity 律师有福了,因为他们将继承网络安全
Pub Date : 2021-10-25 DOI: 10.1145/3498891.3501257
Daniel W. Woods, Aaron Ceross
This paper considers which types of evidence guide cybersecurity decisions. We argue that the “InfoSec belongs to the quants” paradigm will not be realised despite its normative appeal. In terms of progress to date, we find few empirical results that can guide risk mitigation decisions. We suggest the knowledge base about quantitative cybersecurity is continually eroded by increasing complexity, technological flux, and strategic adversaries. Given these secular forces will not abate any time soon, we argue that legal reasoning will increasingly influence cybersecurity decisions relative to technical and quantitative reasoning. The law as a system of social control bristles with ambiguity and so legal mechanisms exist to resolve uncertainties over time. Actors with greater claims to authority over this knowledge base, predominantly lawyers, will accrue decision making power within organisations. We speculate about the downstream impacts of lawyers inheriting cybersecurity, and also sketch the limits of the paradigm’s explanatory power.
本文考虑了哪些类型的证据指导网络安全决策。我们认为,尽管“信息安全属于量化分析师”范式具有规范性吸引力,但它不会实现。就迄今为止的进展而言,我们发现很少有经验结果可以指导风险缓解决策。我们认为,量化网络安全的知识库不断受到日益增加的复杂性、技术变化和战略对手的侵蚀。鉴于这些长期力量不会很快减弱,我们认为,相对于技术和定量推理,法律推理将越来越多地影响网络安全决策。法律作为一种社会控制系统,充满了模糊性,因此存在着解决不确定性的法律机制。对这一知识库拥有更大权威的行为者(主要是律师)将在组织内积累决策权。我们推测了律师继承网络安全的下游影响,并概述了范式解释力的局限性。
{"title":"Blessed Are The Lawyers, For They Shall Inherit Cybersecurity","authors":"Daniel W. Woods, Aaron Ceross","doi":"10.1145/3498891.3501257","DOIUrl":"https://doi.org/10.1145/3498891.3501257","url":null,"abstract":"This paper considers which types of evidence guide cybersecurity decisions. We argue that the “InfoSec belongs to the quants” paradigm will not be realised despite its normative appeal. In terms of progress to date, we find few empirical results that can guide risk mitigation decisions. We suggest the knowledge base about quantitative cybersecurity is continually eroded by increasing complexity, technological flux, and strategic adversaries. Given these secular forces will not abate any time soon, we argue that legal reasoning will increasingly influence cybersecurity decisions relative to technical and quantitative reasoning. The law as a system of social control bristles with ambiguity and so legal mechanisms exist to resolve uncertainties over time. Actors with greater claims to authority over this knowledge base, predominantly lawyers, will accrue decision making power within organisations. We speculate about the downstream impacts of lawyers inheriting cybersecurity, and also sketch the limits of the paradigm’s explanatory power.","PeriodicalId":320273,"journal":{"name":"Proceedings of the 2021 New Security Paradigms Workshop","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114216666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Proceedings of the 2021 New Security Paradigms Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1